People should also realize that even if we implement every privacy measure tomorrow, anything personal that has been mined from us previously will always be linked to our real name. There's nothing that can be done about this. Our only hope is to protect ourselves from adding any more information to their file from now on, and to have no link leading back to the info they already have. This requires always thinking about anything that we are about to do, in case we make ourselves vulnerable again.
Yeah. I wonder what kind of an event (barring Apocalypse-level options) is needed to reverse that. I mean, sure, things like: 1. A massive CME hitting us dead on. 2. Nuclear war. 3. Bladerunner:Blackout would definitely work, but maybe, hopefully, less drastic measures would suffice?
@Rejekelstrong The more you hide the more they can lie about you. These people have no ethics or decency, they are friends, family, associates and they love to build their platform by destroying people any way they can.
As always Rob's looking out for us. You know... You go ANYWHERE else seeking out this kind info you pay out the A$$ for it or have to be getting a degree for cyber security. THIS GUY, THIS REEEEEAL AMERICAN and HUMAN RIGHTS HERO, just gives it out for free! ROB U ARE A HERO!
I've been in IT for 30 years and know all this. Well, maybe not about some of the newer technologies like BTLE which have not directly affected me (yet), but I could never articulate all of that information as eloquently as you, Sir!
man i wish i had you in computer studies at school. 1- no real names on internet or join platforms like zucking FB 2- separate multiple emails partitioned by ID 3 -Have multiple phone No's, one for real & other for internet. 4- Use a de-googled Phone - no device finger print 5 - Use a VPN - IP kept private.
You are my hero don't listen to any of the RUclips bots and trolls you also need to make cheaper simple de-googled phones for all the 3rd world countries, THANK YOU SO MUCH!
Thanks again Rob……..acting on your previous advice I bought a degoogled pixel 2xl phone loaded with Calyx os …..learning to navigate really sharpens my 79 yr young brain!
Well, this is interesting. I just did a search for my name on Google and there are just too many with my name to count. I guess my folks inadvertently assisted with my privacy. These are still very good tips for privacy.
It is now the quickening, prepare yourself. The struggle for your soul is at hand. Whether you believe that you have lost it or are in full control of it. YOU ARE WRONG. You have a choice to make for better or for worse or for neither. Ascend, descend or evade, You can gain the path you want in the current moment. You must choose a side and stick to it.
Unfortunately this kind of video doesn't have drama so it has much fewer views. Sad but the more "teaching" I do, the worse the video does. I get viewers only when I describe a crisis (not necessarily a solution). This is a solution video
@@robbraxmantech "I get viewers only when I describe a crisis (not necessarily a solution). This is a solution video" RUclips caters to a drama queen society.
You should just focus on helping your committed clones that keep redistributing and teaching your information. Are you aware of the Fabian Method? It takes the slow but very steady pace to create an impact and of course change. It was used in a sinister way. But, I believe I use this principle quite successfully when sharing your information. Rob, you keep putting out solid provable information and we will do our part as well.
@@robbraxmantech trying to figure why my WiFi router turns off signal lately connected to Xfinity modem. I tried another router and it was even worse. Signal just shuts off. Can Xfinity shut down my router. They wanted me to install their combo unit. I have to reset router so signal returns.
Rob, you mention getting a Google phone # (Google voice) for free. I did that and had it for quite a while and used it rarely. The last 2 times I tried to use it, Google demanded I share my contact list. I refused so they denied me use of the #. And they eventually took back the #. That woke me up to the fact that, even if I have a degoogled phone, my name and phone number will still be leaked via other people's contact list!
Yeah I have mainly used a single phone as a device & have thought about this major issue. Have done certain things to limit data but certainly not enough. Will be looking into a de-googled phone coming up.
Best advice. I’m going to watch again until I get the full facts as I’ve got a thinking issue but I know I will after a few times. It makes sense but I do use Express VPN and very very happy with it. Just need to pin it all together. 🙏
If that were the case crook's would have to become that more smarter and we've all have to work HARDER to protect our rights / privacy as compared to what we're experiencing now. Laws need to be changed to protect Americans and Government Agencies that unlawfuly spy on American Citizens need to be shutdown.
Very good info. You may recall the recent news story of a woman who had an altercation with a man whose dog was causing an issue. The man videoed her out of context and accused her of discrimination. He doxxed her without mercy, called her employer and she was fired. I just want to know what you think of the steps or process the man used to destroy the woman's life. How did he do it? Thank you.
Is there a way to fill these databases with bogus conflicting data? Perhaps a bot that can be run when CPU cycles are not being used. If you can create an identity that matches everything then doesn’t it become useless?
Rob, what about using more than one computer, both using VPN but choosing different nations to log into? The VPN provider will know it's the same identity because they are being paid each month, but there would be no other crossover of information between the two, and using your new VPN service that problem can be even more minimized. One computer could be used for real life and business; the other for using fake identities and social media. I know the same separation could be obtained using multiple login identities on one computer [fred01, barry02, etc], but it's a pain to have to keep switching from one to the other each time there's a need.
A little overdone for Big tech opposition. But yes it would do well of course. I don't think it is necessary though. A VPN aggregates data from multiple sources. Since my VPN has no logs. All I know is that you're using it. I don't know what you're doing. And with other people in the mix (hundreds), it's not possible to match to identities. And on top of that the traffic is mostly HTTPS (encrypted) anyway.
Thanks, Rob. Can you address credit/debit card compromise at online point of purchase? Hacker may have card number, email address, actual home address, and phone number.
A hacker can get your information from you home internet and by being online. They get your IP address, your address, phone number, the kind of phone you are using and your birth date, annnd your name. That’s all a hacker needs to steal your identity and all your personal information. It happened to me.
I'm 50 and happen to question the narative of space and the ground we walk on. I recieved a spam Quora email today....."How can I prove the earth is a globe to my dad". I have witnessed Alexa products listening and then hitting you with focused advertising. They are so listening, hard.
With the google voice number (this video I think, I've watched a couple back to back before commenting)... I think I have never used a real number to 'activate' it to. Nor have I linked it to a number. I simply to chose the "skip" option. I started google voice on a desktop (skype alternative) then used it on a wifi only tablet, then put it on a 'cell phone' with no cellular service. The application recognizes device type, so I have only received the notification to attach a phone number when initially running the app on a device that can use cellular services. But again, I just selected "skip".
Mr. Braxton, I guess if you forward your emails to another email, that is also visible? So you can never forward emails to another email or else it is like not having another email at all?
What can be done now when you've already used your phone number for years...literally a decade. It can't be erased now..seems like most people are probably screwed
I was thinking....is there any way to 'clean up' or just remove prior internet profile? I mean, we all probably have a LOT out there. I know I do. Also, where do you start? :D If you can't do all, is it worth it even to do some? For example, my $ is made through FB marketplace. I also have a couple groups I'm connected with there that are very helpful for local political organization and general health. But I really don't do much besides those 2. Commenting, posting, etc. hardly at all. How to start from ground zero when your whole family isn't on board and will still tag you in things, not do a VPN, etc?
Are there any 3rd part contact management apps that are content to simply sell their apps, and not suck back the data? So by going to a 3rd party add, you can keep it personal? Or would you have to keep it in a generic database, excel, etc. file?
Hi Rob - wouldn't it be much easier and private to do authentication using a HW stick like YubiKey with no reliance on your mobile phone at all? The way you describe it is too complicated to me.
Well if anyone in the chain did it would likely be through a third party, whether it's a vendor, organization and even govs. If it's a targeting campaign you'll see multiple third parties and a huge amount of misrepresentation of collected personal characteristics. The types of attacks will likely vary depending on the nature of potential adversaries. I think it increases in severity depending on the target from bait and gaslighting into full out burn protocol with people staging and reporting. As far as I can tell, everyone ghosts so it's hard to collect info which I guess means it's highly effective.
Rob, on my phone I access almost all information, including youtube, through the duck duck go browser and clear cookies after each visit. Also use a VPN. So I can't be tracked using a device fingerprint this way, right?
This is all great for the techie type person. However I’m gonna venture to say 95% of the world would never be able to adhere or even implement these suggestions. It’s really scary to realize how far down the rabbit hole we have gone and how much privacy we have lost. Hummmm….
Some agency listens while you talk on cell phone. Most probably through the cell towers. How to know if they are listening to you. If they do then how to stop them from listening?
This may be a noob/obvious question but can a dual sim phone be tracked and have both sim cards compromised even if you compartmentalize the usage of the sim cards?
If it's de-Googled I think it will work. If it's a regular phone, Google can read the security chip, IMSI and IMEI so the device fingerprint is the same
Can anyone answer this question? What is the name of the governmental platform which transforms an individual to a walking transponder even though the person has no electronic devices, just his new passport?
Rob, Microsoft (used to? Still does?) track the internal serial numbers of your computer drives and inventories the graphics card, amount of ram, and other factors to authenticate a Windows serial number is only used on one machine. So it is confirmed that your computer can be identified by internal serial numbers that are unlikely to change, except during upgrades. Doesn't that also provide another level of fingerprinting on computers?
O se ponerlo no se ponerlo soy muy torpe. Base conectarme llo tengo una parato para ver películas pero no sé por Merlo soy muy torpe estoy sola no lose ponerlo
I did explain it, I hope, clearly. It's not as important when on LTE, at least against big tech. Though it may have other importance for security reasons
Here is a difficult hypothetical, What if you need to have a document notarized, and it has your Social Security number, birthdate, Mother's maiden name, and other personal information? What if the Notary Public sees a need to keep a copy of what they assert is true? What if this N.P. is vulnerable to compromise, criminal, or financial, willing to sell personal information to entities that would never reveal how they gained this information?
LTE Ip address is shared from a pool. So only carrier knows who used it at any particular time. It is not an identifier to an outside party. The threat is DSL IP
@@robbraxmantech So basically the main issue is when you are on a desktop on broadband connections? It is ONLY DSL, or is this also an issue on cable internet?
@@robbraxmantech thank you for the answer, now i have a theoretical question: lets say that in the future the west become totalitarian and the governments will go to VPN providers and demand past information or data on users. can VPN providers search and give this information to the government (assuming they do as they claim and not saving any data on users) ? P.S your content is a necessity !
This is what supposedly clever criminals should realize - 'they' know you are a criminal. 'They' know whom you are doing deals with. The only reason you aren't being arrested is because the controllers of that information want to make more money, gain more power than waste their time on 'small fry'. e.g. Smugglers 'get away' with it for a bit of time then get caught - how much did they smuggle before being caught? whos' product were they smuggling? When the public 'demand action' for criminality, they throw the public the bones, the waste or expose criminals after they are no threat to 'their' business. E.G. Epstein, Savile, Narcotics...
@@robbraxmantech All transaction are traceable are they not? The *things* you sell don't require tracing but the transaction itself does. I'm still watching more of your videos, cant decide if it matters at this point since I'm so old. I do know my friends that are police do not use facebook but there spouses do.
Llo no veo nada no kiero más tontería ni ver películas no veo nada estoy esperando los dineros no puedo ablas ni trabajar ni nada no puedo ver nada menos película no puedo pagarla nada
Llo no tengo ordenador no tengo privado no tengo nada no kiero nada gue me dejes en paz llo no kiero nada más gue lo mío no kiero ser rico Hi libre trankila solidaria Hi en mi casa sola agutito libre de todo los líos
No estiendo chino déjame en paz no tengo ordenador no se tocarlo sin título ni internet ni estudios vucate a un chino gue hay munchos un parado de trabajar más gue llo no valgo nada no me valores tanto sin estudios vucate an un negro Ho blanco meda higual llo estoy en mi casa con mi perrillos chicos ditraida me guta más gue tu trabajo de chinos no lo entiendo nada vucate ha hotro chino déjame en paz no kiero tanto dinero chino no lo entiendo nada ni de letras no puedo ablas nada ni tengo tiempo nada más gue mi perrillos son tan bonitos gue no lo dejo solos nunca me lo llevo en el carrillo de la compra ala calle me alluda atiral del carro abecés tiran de mi rodillas no puedo andas Hi de carrillo son tanbonitos
@c2s Me as well. Rob is an intelligent man and he does know what he is talking about. It’s a good thing that he is here for all of us so we can learn from him. Much love 💕
You do humanity a great service. I need to up my game. When this phone dies I want to become a customer. Much to learn though.
People should also realize that even if we implement every privacy measure tomorrow, anything personal that has been mined from us previously will always be linked to our real name. There's nothing that can be done about this. Our only hope is to protect ourselves from adding any more information to their file from now on, and to have no link leading back to the info they already have. This requires always thinking about anything that we are about to do, in case we make ourselves vulnerable again.
Yeah. I wonder what kind of an event (barring Apocalypse-level options) is needed to reverse that.
I mean, sure, things like:
1. A massive CME hitting us dead on.
2. Nuclear war.
3. Bladerunner:Blackout
would definitely work, but maybe, hopefully, less drastic measures would suffice?
@Rejekelstrong Except they are already in the process of turning your children against you.
@Rejekelstrong The more you hide the more they can lie about you. These people have no ethics or decency, they are friends, family, associates and they love to build their platform by destroying people any way they can.
@@jameslynch8738 what platform?
As always Rob's looking out for us. You know... You go ANYWHERE else seeking out this kind info you pay out the A$$ for it or have to be getting a degree for cyber security. THIS GUY, THIS REEEEEAL AMERICAN and HUMAN RIGHTS HERO, just gives it out for free! ROB U ARE A HERO!
Every one should consider buying a degoogled phone. To protect their privacy!
I've been in IT for 30 years and know all this. Well, maybe not about some of the newer technologies like BTLE which have not directly affected me (yet), but I could never articulate all of that information as eloquently as you, Sir!
man i wish i had you in computer studies at school.
1- no real names on internet or join platforms like zucking FB
2- separate multiple emails partitioned by ID
3 -Have multiple phone No's, one for real & other for internet.
4- Use a de-googled Phone - no device finger print
5 - Use a VPN - IP kept private.
You are my hero don't listen to any of the RUclips bots and trolls you also need to make cheaper simple de-googled phones for all the 3rd world countries, THANK YOU SO MUCH!
I'm limited by what's available. Unfortunately I'm just a service provider. I cannot manufacture.
Start by adding every member of Congress to your contact list. I'm sure you can find other influentional groups. Build those links!
As Always, this is the best of the best privacy and internet security information! Thanks
This information is extremely relevant in a world where one's rights are being diminished do to a Global Pandemic.
Thanks!
Thanks again Rob……..acting on your previous advice I bought a degoogled pixel 2xl phone loaded with Calyx os …..learning to navigate really sharpens my 79 yr young brain!
Excellent and Invaluable presentation. Wonderful Intellect!
Well, this is interesting. I just did a search for my name on Google and there are just too many with my name to count. I guess my folks inadvertently assisted with my privacy. These are still very good tips for privacy.
It is now the quickening, prepare yourself. The struggle for your soul is at hand. Whether you believe that you have lost it or are in full control of it. YOU ARE WRONG. You have a choice to make for better or for worse or for neither. Ascend, descend or evade, You can gain the path you want in the current moment. You must choose a side and stick to it.
GREAT video! Loved having it all laid out like this. Very shareable with those who don’t dine on this stuff regularly. Thanks!
Great video, shows how tech shouldn't be seen as benign
Unfortunately this kind of video doesn't have drama so it has much fewer views. Sad but the more "teaching" I do, the worse the video does. I get viewers only when I describe a crisis (not necessarily a solution). This is a solution video
@@robbraxmantech
"I get viewers only when I describe a crisis (not necessarily a solution). This is a solution video"
RUclips caters to a drama queen society.
Just keep being you, rob
You should just focus on helping your committed clones that keep redistributing and teaching your information. Are you aware of the Fabian Method? It takes the slow but very steady pace to create an impact and of course change. It was used in a sinister way. But, I believe I use this principle quite successfully when sharing your information. Rob, you keep putting out solid provable information and we will do our part as well.
@@robbraxmantech trying to figure why my WiFi router turns off signal lately connected to Xfinity modem. I tried another router and it was even worse. Signal just shuts off. Can Xfinity shut down my router. They wanted me to install their combo unit. I have to reset router so signal returns.
Thanks Brax
Crushing it as per 😎🥂
when i say stuff like what you mentioned i get called paranoid
To them It's called paranoid, to us... IT'S INTELLIGENCE❗
These are the questions I mostly ask about...I am a Mobile Soldier. Mr. H® approved...
Rob and The Hated one both Tops in my Book.
Rob, you mention getting a Google phone # (Google voice) for free. I did that and had it for quite a while and used it rarely. The last 2 times I tried to use it, Google demanded I share my contact list. I refused so they denied me use of the #. And they eventually took back the #.
That woke me up to the fact that, even if I have a degoogled phone, my name and phone number will still be leaked via other people's contact list!
It's unbelievebale, Big Tech has too much power.
Yeah I have mainly used a single phone as a device & have thought about this major issue. Have done certain things to limit data but certainly not enough. Will be looking into a de-googled phone coming up.
Best advice. I’m going to watch again until I get the full facts as I’ve got a thinking issue but I know I will after a few times. It makes sense but I do use Express VPN and very very happy with it. Just need to pin it all together. 🙏
Thank you very much, Rob! 🌞😀🤗
Wealth of information!
Thank you.💖
Every high school should teach these facts to the new generation.
If that were the case crook's would have to become that more smarter and we've all have to work HARDER to protect our rights / privacy as compared to what we're experiencing now.
Laws need to be changed to protect Americans and Government Agencies that unlawfuly spy on American Citizens need to be shutdown.
Schools are compromised. They're indoctrinating the next generation and big tech are one of the beneficiaries.
Very good info. You may recall the recent news story of a woman who had an altercation with a man whose dog was causing an issue. The man videoed her out of context and accused her of discrimination. He doxxed her without mercy, called her employer and she was fired. I just want to know what you think of the steps or process the man used to destroy the woman's life. How did he do it? Thank you.
Nice bait, m8
Is there a way to fill these databases with bogus conflicting data? Perhaps a bot that can be run when CPU cycles are not being used. If you can create an identity that matches everything then doesn’t it become useless?
The absolute dumbest reply, "I have nothing to hide"!
There's a comment like that in every video. LOL
@@robbraxmantech As it should. It must be repeated over and over again, till it begins to register and make sense!
Rob, what about using more than one computer, both using VPN but choosing different nations to log into? The VPN provider will know it's the same identity because they are being paid each month, but there would be no other crossover of information between the two, and using your new VPN service that problem can be even more minimized. One computer could be used for real life and business; the other for using fake identities and social media. I know the same separation could be obtained using multiple login identities on one computer [fred01, barry02, etc], but it's a pain to have to keep switching from one to the other each time there's a need.
A little overdone for Big tech opposition. But yes it would do well of course. I don't think it is necessary though. A VPN aggregates data from multiple sources. Since my VPN has no logs. All I know is that you're using it. I don't know what you're doing. And with other people in the mix (hundreds), it's not possible to match to identities. And on top of that the traffic is mostly HTTPS (encrypted) anyway.
Thanks, Rob. Can you address credit/debit card compromise at online point of purchase? Hacker may have card number, email address, actual home address, and phone number.
Easily done by a hacker.
A hacker can get your information from you home internet and by being online. They get your IP address, your address, phone number, the kind of phone you are using and your birth date, annnd your name. That’s all a hacker needs to steal your identity and all your personal information. It happened to me.
I'm 50 and happen to question the narative of space and the ground we walk on. I recieved a spam Quora email today....."How can I prove the earth is a globe to my dad". I have witnessed Alexa products listening and then hitting you with focused advertising. They are so listening, hard.
There is a little problem with VPN's. You have to trust that your provider does not sell your data (or use it in a different way).
This is great info. Thanks Rob!
With the google voice number (this video I think, I've watched a couple back to back before commenting)... I think I have never used a real number to 'activate' it to. Nor have I linked it to a number. I simply to chose the "skip" option. I started google voice on a desktop (skype alternative) then used it on a wifi only tablet, then put it on a 'cell phone' with no cellular service. The application recognizes device type, so I have only received the notification to attach a phone number when initially running the app on a device that can use cellular services. But again, I just selected "skip".
ditto!
Mr. Braxton, I guess if you forward your emails to another email, that is also visible? So you can never forward emails to another email or else it is like not having another email at all?
Great Job👍🏽, please I need your help, my phone is being controlled by hackers.. How can I help it?
Informative and useful as always.
Hi Rob, thanks for your work, can you make a video about I2P network and how it might be used for a secure communication?
What can be done now when you've already used your phone number for years...literally a decade. It can't be erased now..seems like most people are probably screwed
As the video explains, keep the phone for real people, and another number for 2FA. Don't mix the two. That is explained in detail
Can you make a review regarding Session app please... It is a private messaging app..thanks
That stalking activity sounds unlawful
When it's so difficult to protect yout privacy, it's easier to use the internet less.
McAfee did not uninstall himself.
I was thinking....is there any way to 'clean up' or just remove prior internet profile? I mean, we all probably have a LOT out there. I know I do. Also, where do you start? :D If you can't do all, is it worth it even to do some? For example, my $ is made through FB marketplace. I also have a couple groups I'm connected with there that are very helpful for local political organization and general health. But I really don't do much besides those 2. Commenting, posting, etc. hardly at all. How to start from ground zero when your whole family isn't on board and will still tag you in things, not do a VPN, etc?
Are there any 3rd part contact management apps that are content to simply sell their apps, and not suck back the data? So by going to a 3rd party add, you can keep it personal?
Or would you have to keep it in a generic database, excel, etc. file?
Hi Rob - wouldn't it be much easier and private to do authentication using a HW stick like YubiKey with no reliance on your mobile phone at all? The way you describe it is too complicated to me.
When you register a sim card you'll need a debit card, passport or driving license.
There is no privacy
Do the de-googled phones have any back doors to the person who de-googled it? Can the person you got it from access info from it after the fact?
AOSP is open source. I use LineageOS which is open source
Well if anyone in the chain did it would likely be through a third party, whether it's a vendor, organization and even govs. If it's a targeting campaign you'll see multiple third parties and a huge amount of misrepresentation of collected personal characteristics. The types of attacks will likely vary depending on the nature of potential adversaries. I think it increases in severity depending on the target from bait and gaslighting into full out burn protocol with people staging and reporting. As far as I can tell, everyone ghosts so it's hard to collect info which I guess means it's highly effective.
@@jameslynch8738 what do you mean "staging and reporting"? Burn protocol?
@@benhicks9494 That would depend on how advanced the adversary is.
@@jameslynch8738 what kind of adversaries would use these tactics and why? Anyone can be targeted?
Should we buy a Iridium Phone and just use the data with another WiFi phone? What are your thoughts on Starlink?
Rob, on my phone I access almost all information, including youtube, through the duck duck go browser and clear cookies after each visit. Also use a VPN. So I can't be tracked using a device fingerprint this way, right?
No. Sorry. Google is working in the background.
This is all great for the techie type person. However I’m gonna venture to say 95% of the world would never be able to adhere or even implement these suggestions. It’s really scary to realize how far down the rabbit hole we have gone and how much privacy we have lost. Hummmm….
Zuck knows we're zucked because no one will listen.
The average person isn’t going to suffer even a minor inconvenience when they can automagically access their “free” services.
Some agency listens while you talk on cell phone. Most probably through the cell towers. How to know if they are listening to you. If they do then how to stop them from listening?
This may be a noob/obvious question but can a dual sim phone be tracked and have both sim cards compromised even if you compartmentalize the usage of the sim cards?
If it's de-Googled I think it will work. If it's a regular phone, Google can read the security chip, IMSI and IMEI so the device fingerprint is the same
@@robbraxmantech Thank you for answering. I'll remember that in the future and differently go for a de -googled phone
Can anyone answer this question? What is the name of the governmental platform which transforms an individual to a walking transponder even though the person has no electronic devices, just his new passport?
Rob, Microsoft (used to? Still does?) track the internal serial numbers of your computer drives and inventories the graphics card, amount of ram, and other factors to authenticate a Windows serial number is only used on one machine. So it is confirmed that your computer can be identified by internal serial numbers that are unlikely to change, except during upgrades. Doesn't that also provide another level of fingerprinting on computers?
Yes. But the tracking of your social media is done by other parties and they can't access those serial number things from the browser
O se ponerlo no se ponerlo soy muy torpe. Base conectarme llo tengo una parato para ver películas pero no sé por Merlo soy muy torpe estoy sola no lose ponerlo
Is browser isolation worth doing on a cell phone at all?
Bad nosy neighbors.
Hey ROB sorry I’ve been so absent 😞
You do not speak about using a VPN for cell phones using data?
I did explain it, I hope, clearly. It's not as important when on LTE, at least against big tech. Though it may have other importance for security reasons
Here is a difficult hypothetical, What if you need to have a document notarized, and it has your Social Security number, birthdate, Mother's maiden name, and other personal information? What if the Notary Public sees a need to keep a copy of what they assert is true? What if this N.P. is vulnerable to compromise, criminal, or financial, willing to sell personal information to entities that would never reveal how they gained this information?
You cannot stop your real name data from leaking. that's settled. You can stop correlating other activities to your real name though
@@robbraxmantech Thanks Rob for taking the time.
Can we change our phone ip address so that the ip address we have emitted in the past are useless?
LTE Ip address is shared from a pool. So only carrier knows who used it at any particular time. It is not an identifier to an outside party. The threat is DSL IP
@@robbraxmantech So basically the main issue is when you are on a desktop on broadband connections? It is ONLY DSL, or is this also an issue on cable internet?
Have an unknown recovery ph# on Google account? Not sure if peeps.
about the device ID. What would happen if I have a google phone with a linux os (not android of course)?
It would be great!
So disable 2FA?
Rob, I haven't heard much about satellite phones , I'm new to your channel but ,would they be a privacy option?
Sure. Expensive and minimal privacy gain. Maybe the main benefit is that the phone does not have apps
Free vpn will not be so useful at home cos all devices uses router. So I will need a vpn router correct?
There is no real privacy with a "free VPN" since those are usually proxy servers (which cache your internet activity).
@@robbraxmantech thanks for the confirmation.
Jorge Menendez runs an illegal car chop shop. Lol 😆 lol I want to
Rob, do we know for sure that VPN Providers does not save our Information, or we just assume that?
There's trust involved. So just so you know, I'm a real person running a VPN service with your privacy in mind. Not a big corporation
@@robbraxmantech thank you for the answer, now i have a theoretical question: lets say that in the future the west become totalitarian and the governments will go to VPN providers and demand past information or data on users. can VPN providers search and give this information to the government (assuming they do as they claim and not saving any data on users) ?
P.S your content is a necessity !
I cannot afford to trash my $1,000 phone and buy a de-Googled phone. I struggled to pay for this phone.
No tengo ordenador ni juegos ni internet no funciona nada
great
Wouldn’t Startpage still be @ the mercy of the echo chamber sanitized search results as google because it’s using google?
#BuildTheWall :)
LOL when i heard zackbook
This is what supposedly clever criminals should realize - 'they' know you are a criminal. 'They' know whom you are doing deals with. The only reason you aren't being arrested is because the controllers of that information want to make more money, gain more power than waste their time on 'small fry'. e.g. Smugglers 'get away' with it for a bit of time then get caught - how much did they smuggle before being caught? whos' product were they smuggling? When the public 'demand action' for criminality, they throw the public the bones, the waste or expose criminals after they are no threat to 'their' business. E.G. Epstein, Savile, Narcotics...
True!
We cannot buy any products or services even from you without it being traceable
I didn't know that I was selling things that require tracing. I just sell phones and networking products and services.
@@robbraxmantech All transaction are traceable are they not? The *things* you sell don't require tracing but the transaction itself does. I'm still watching more of your videos, cant decide if it matters at this point since I'm so old. I do know my friends that are police do not use facebook but there spouses do.
Llo no veo nada no kiero más tontería ni ver películas no veo nada estoy esperando los dineros no puedo ablas ni trabajar ni nada no puedo ver nada menos película no puedo pagarla nada
Llo no tengo ordenador no tengo privado no tengo nada no kiero nada gue me dejes en paz llo no kiero nada más gue lo mío no kiero ser rico Hi libre trankila solidaria Hi en mi casa sola agutito libre de todo los líos
No estiendo chino déjame en paz no tengo ordenador no se tocarlo sin título ni internet ni estudios vucate a un chino gue hay munchos un parado de trabajar más gue llo no valgo nada no me valores tanto sin estudios vucate an un negro Ho blanco meda higual llo estoy en mi casa con mi perrillos chicos ditraida me guta más gue tu trabajo de chinos no lo entiendo nada vucate ha hotro chino déjame en paz no kiero tanto dinero chino no lo entiendo nada ni de letras no puedo ablas nada ni tengo tiempo nada más gue mi perrillos son tan bonitos gue no lo dejo solos nunca me lo llevo en el carrillo de la compra ala calle me alluda atiral del carro abecés tiran de mi rodillas no puedo andas Hi de carrillo son tanbonitos
Todo el mentira solo habla ni lo entiendo nada gracias
PLEASE CUT THE MUSAK, ìt really, really, f**ks up we who use hearing aids. Thank you.
I wish you could limit your videos to 10 minutes.
I can guarantee you that's not going to happen. Sorry.
Rob has the greatest information.. listen and learn!
@c2s Me as well. Rob is an intelligent man and he does know what he is talking about. It’s a good thing that he is here for all of us so we can learn from him. Much love 💕
@c2s I agree and they also don’t know the risks of the web, and websites that they are going on.