Privacy Primer: Partitioning Email, Phone number, Devices

Поделиться
HTML-код
  • Опубликовано: 22 ноя 2024

Комментарии • 156

  • @noelmckinney9559
    @noelmckinney9559 3 года назад +27

    You do humanity a great service. I need to up my game. When this phone dies I want to become a customer. Much to learn though.

  • @berlinirving3589
    @berlinirving3589 3 года назад +52

    People should also realize that even if we implement every privacy measure tomorrow, anything personal that has been mined from us previously will always be linked to our real name. There's nothing that can be done about this. Our only hope is to protect ourselves from adding any more information to their file from now on, and to have no link leading back to the info they already have. This requires always thinking about anything that we are about to do, in case we make ourselves vulnerable again.

    • @HTWW
      @HTWW 3 года назад +1

      Yeah. I wonder what kind of an event (barring Apocalypse-level options) is needed to reverse that.
      I mean, sure, things like:
      1. A massive CME hitting us dead on.
      2. Nuclear war.
      3. Bladerunner:Blackout
      would definitely work, but maybe, hopefully, less drastic measures would suffice?

    • @FredSpade
      @FredSpade 3 года назад +5

      @Rejekelstrong Except they are already in the process of turning your children against you.

    • @jameslynch8738
      @jameslynch8738 3 года назад

      @Rejekelstrong The more you hide the more they can lie about you. These people have no ethics or decency, they are friends, family, associates and they love to build their platform by destroying people any way they can.

    • @benhicks9494
      @benhicks9494 3 года назад

      @@jameslynch8738 what platform?

  • @LostAmericanJ
    @LostAmericanJ 3 года назад +10

    As always Rob's looking out for us. You know... You go ANYWHERE else seeking out this kind info you pay out the A$$ for it or have to be getting a degree for cyber security. THIS GUY, THIS REEEEEAL AMERICAN and HUMAN RIGHTS HERO, just gives it out for free! ROB U ARE A HERO!

    • @thomasradovnikovic6518
      @thomasradovnikovic6518 3 года назад +1

      Every one should consider buying a degoogled phone. To protect their privacy!

  • @surfingnoid
    @surfingnoid 3 года назад +4

    I've been in IT for 30 years and know all this. Well, maybe not about some of the newer technologies like BTLE which have not directly affected me (yet), but I could never articulate all of that information as eloquently as you, Sir!

  • @zwarst
    @zwarst 3 года назад +6

    man i wish i had you in computer studies at school.
    1- no real names on internet or join platforms like zucking FB
    2- separate multiple emails partitioned by ID
    3 -Have multiple phone No's, one for real & other for internet.
    4- Use a de-googled Phone - no device finger print
    5 - Use a VPN - IP kept private.

  • @ronaldmcdonald4368
    @ronaldmcdonald4368 3 года назад +1

    You are my hero don't listen to any of the RUclips bots and trolls you also need to make cheaper simple de-googled phones for all the 3rd world countries, THANK YOU SO MUCH!

    • @robbraxmantech
      @robbraxmantech  3 года назад

      I'm limited by what's available. Unfortunately I'm just a service provider. I cannot manufacture.

  • @lyfandeth
    @lyfandeth 3 года назад +10

    Start by adding every member of Congress to your contact list. I'm sure you can find other influentional groups. Build those links!

  • @RoninDosho
    @RoninDosho 3 года назад +10

    As Always, this is the best of the best privacy and internet security information! Thanks

  • @benkepmen6964
    @benkepmen6964 3 года назад +5

    This information is extremely relevant in a world where one's rights are being diminished do to a Global Pandemic.

  • @RSM0047
    @RSM0047 3 года назад +7

    Thanks!

  • @thomasradovnikovic6518
    @thomasradovnikovic6518 3 года назад

    Thanks again Rob……..acting on your previous advice I bought a degoogled pixel 2xl phone loaded with Calyx os …..learning to navigate really sharpens my 79 yr young brain!

  • @WmTyndale
    @WmTyndale 3 года назад +4

    Excellent and Invaluable presentation. Wonderful Intellect!

  • @BramSLI1
    @BramSLI1 2 года назад

    Well, this is interesting. I just did a search for my name on Google and there are just too many with my name to count. I guess my folks inadvertently assisted with my privacy. These are still very good tips for privacy.

  • @newtoncain
    @newtoncain 3 года назад

    It is now the quickening, prepare yourself. The struggle for your soul is at hand. Whether you believe that you have lost it or are in full control of it. YOU ARE WRONG. You have a choice to make for better or for worse or for neither. Ascend, descend or evade, You can gain the path you want in the current moment. You must choose a side and stick to it.

  • @zita-lein
    @zita-lein 3 года назад +3

    GREAT video! Loved having it all laid out like this. Very shareable with those who don’t dine on this stuff regularly. Thanks!

  • @ScorpionCar
    @ScorpionCar 3 года назад +9

    Great video, shows how tech shouldn't be seen as benign

    • @robbraxmantech
      @robbraxmantech  3 года назад +22

      Unfortunately this kind of video doesn't have drama so it has much fewer views. Sad but the more "teaching" I do, the worse the video does. I get viewers only when I describe a crisis (not necessarily a solution). This is a solution video

    • @scotttovey
      @scotttovey 3 года назад +4

      ​@@robbraxmantech
      "I get viewers only when I describe a crisis (not necessarily a solution). This is a solution video"
      RUclips caters to a drama queen society.

    • @carolyncannon7805
      @carolyncannon7805 3 года назад +3

      Just keep being you, rob

    • @ArtOfHealth
      @ArtOfHealth 3 года назад +1

      You should just focus on helping your committed clones that keep redistributing and teaching your information. Are you aware of the Fabian Method? It takes the slow but very steady pace to create an impact and of course change. It was used in a sinister way. But, I believe I use this principle quite successfully when sharing your information. Rob, you keep putting out solid provable information and we will do our part as well.

    • @gregsz1ful
      @gregsz1ful 3 года назад

      @@robbraxmantech trying to figure why my WiFi router turns off signal lately connected to Xfinity modem. I tried another router and it was even worse. Signal just shuts off. Can Xfinity shut down my router. They wanted me to install their combo unit. I have to reset router so signal returns.

  • @Go_Show95
    @Go_Show95 3 года назад +8

    Thanks Brax
    Crushing it as per 😎🥂

  • @ainzooalgown7589
    @ainzooalgown7589 3 года назад +7

    when i say stuff like what you mentioned i get called paranoid

    • @josiet.2661
      @josiet.2661 3 года назад

      To them It's called paranoid, to us... IT'S INTELLIGENCE❗

  • @hasdrubalsosamarquez5430
    @hasdrubalsosamarquez5430 3 года назад

    These are the questions I mostly ask about...I am a Mobile Soldier. Mr. H® approved...

  • @astrophotonics9470
    @astrophotonics9470 3 года назад +1

    Rob and The Hated one both Tops in my Book.

  • @robine5454
    @robine5454 2 года назад +1

    Rob, you mention getting a Google phone # (Google voice) for free. I did that and had it for quite a while and used it rarely. The last 2 times I tried to use it, Google demanded I share my contact list. I refused so they denied me use of the #. And they eventually took back the #.
    That woke me up to the fact that, even if I have a degoogled phone, my name and phone number will still be leaked via other people's contact list!

    • @fionnuna7947
      @fionnuna7947 2 года назад +1

      It's unbelievebale, Big Tech has too much power.

  • @Dang3rMouSe
    @Dang3rMouSe 3 года назад

    Yeah I have mainly used a single phone as a device & have thought about this major issue. Have done certain things to limit data but certainly not enough. Will be looking into a de-googled phone coming up.

  • @LoftechUK
    @LoftechUK 3 года назад

    Best advice. I’m going to watch again until I get the full facts as I’ve got a thinking issue but I know I will after a few times. It makes sense but I do use Express VPN and very very happy with it. Just need to pin it all together. 🙏

  • @happypotential
    @happypotential 3 года назад +2

    Thank you very much, Rob! 🌞😀🤗

  • @venividivici6466
    @venividivici6466 3 года назад +2

    Wealth of information!
    Thank you.💖

  • @somedude5951
    @somedude5951 3 года назад

    Every high school should teach these facts to the new generation.

    • @benkepmen6964
      @benkepmen6964 3 года назад

      If that were the case crook's would have to become that more smarter and we've all have to work HARDER to protect our rights / privacy as compared to what we're experiencing now.
      Laws need to be changed to protect Americans and Government Agencies that unlawfuly spy on American Citizens need to be shutdown.

    • @FredSpade
      @FredSpade 3 года назад

      Schools are compromised. They're indoctrinating the next generation and big tech are one of the beneficiaries.

  • @debbieandmarc
    @debbieandmarc 3 года назад +9

    Very good info. You may recall the recent news story of a woman who had an altercation with a man whose dog was causing an issue. The man videoed her out of context and accused her of discrimination. He doxxed her without mercy, called her employer and she was fired. I just want to know what you think of the steps or process the man used to destroy the woman's life. How did he do it? Thank you.

  • @tedo3332
    @tedo3332 3 года назад +3

    Is there a way to fill these databases with bogus conflicting data? Perhaps a bot that can be run when CPU cycles are not being used. If you can create an identity that matches everything then doesn’t it become useless?

  • @web3982
    @web3982 3 года назад +8

    The absolute dumbest reply, "I have nothing to hide"!

    • @robbraxmantech
      @robbraxmantech  3 года назад +11

      There's a comment like that in every video. LOL

    • @web3982
      @web3982 3 года назад +4

      @@robbraxmantech As it should. It must be repeated over and over again, till it begins to register and make sense!

  • @berlinirving3589
    @berlinirving3589 3 года назад +6

    Rob, what about using more than one computer, both using VPN but choosing different nations to log into? The VPN provider will know it's the same identity because they are being paid each month, but there would be no other crossover of information between the two, and using your new VPN service that problem can be even more minimized. One computer could be used for real life and business; the other for using fake identities and social media. I know the same separation could be obtained using multiple login identities on one computer [fred01, barry02, etc], but it's a pain to have to keep switching from one to the other each time there's a need.

    • @robbraxmantech
      @robbraxmantech  3 года назад +9

      A little overdone for Big tech opposition. But yes it would do well of course. I don't think it is necessary though. A VPN aggregates data from multiple sources. Since my VPN has no logs. All I know is that you're using it. I don't know what you're doing. And with other people in the mix (hundreds), it's not possible to match to identities. And on top of that the traffic is mostly HTTPS (encrypted) anyway.

  • @Ottee2
    @Ottee2 3 года назад +5

    Thanks, Rob. Can you address credit/debit card compromise at online point of purchase? Hacker may have card number, email address, actual home address, and phone number.

    • @amosmoses8402
      @amosmoses8402 3 года назад

      Easily done by a hacker.

    • @amosmoses8402
      @amosmoses8402 3 года назад

      A hacker can get your information from you home internet and by being online. They get your IP address, your address, phone number, the kind of phone you are using and your birth date, annnd your name. That’s all a hacker needs to steal your identity and all your personal information. It happened to me.

  • @masteragario3335
    @masteragario3335 3 года назад +3

    I'm 50 and happen to question the narative of space and the ground we walk on. I recieved a spam Quora email today....."How can I prove the earth is a globe to my dad". I have witnessed Alexa products listening and then hitting you with focused advertising. They are so listening, hard.

  • @pantarei.
    @pantarei. 7 месяцев назад

    There is a little problem with VPN's. You have to trust that your provider does not sell your data (or use it in a different way).

  • @ronfox5519
    @ronfox5519 3 года назад +5

    This is great info. Thanks Rob!

  • @igounfazed
    @igounfazed 3 года назад

    With the google voice number (this video I think, I've watched a couple back to back before commenting)... I think I have never used a real number to 'activate' it to. Nor have I linked it to a number. I simply to chose the "skip" option. I started google voice on a desktop (skype alternative) then used it on a wifi only tablet, then put it on a 'cell phone' with no cellular service. The application recognizes device type, so I have only received the notification to attach a phone number when initially running the app on a device that can use cellular services. But again, I just selected "skip".

  • @billynomates920
    @billynomates920 3 года назад +3

    ditto!

  • @wendys390
    @wendys390 Год назад

    Mr. Braxton, I guess if you forward your emails to another email, that is also visible? So you can never forward emails to another email or else it is like not having another email at all?

  • @mogbeamreyan8912
    @mogbeamreyan8912 2 года назад

    Great Job👍🏽, please I need your help, my phone is being controlled by hackers.. How can I help it?

  • @somewhere6
    @somewhere6 3 года назад +1

    Informative and useful as always.

  • @AleksyGrabovski
    @AleksyGrabovski 3 года назад

    Hi Rob, thanks for your work, can you make a video about I2P network and how it might be used for a secure communication?

  • @knothead35
    @knothead35 3 года назад +2

    What can be done now when you've already used your phone number for years...literally a decade. It can't be erased now..seems like most people are probably screwed

    • @robbraxmantech
      @robbraxmantech  3 года назад +5

      As the video explains, keep the phone for real people, and another number for 2FA. Don't mix the two. That is explained in detail

  • @cinventures
    @cinventures 2 года назад

    Can you make a review regarding Session app please... It is a private messaging app..thanks

  • @jjones2896
    @jjones2896 3 года назад +2

    That stalking activity sounds unlawful

  • @EconaelGaming
    @EconaelGaming 3 года назад

    When it's so difficult to protect yout privacy, it's easier to use the internet less.

  • @bruceli9094
    @bruceli9094 3 года назад +3

    McAfee did not uninstall himself.

  • @behindblueyes
    @behindblueyes 3 года назад

    I was thinking....is there any way to 'clean up' or just remove prior internet profile? I mean, we all probably have a LOT out there. I know I do. Also, where do you start? :D If you can't do all, is it worth it even to do some? For example, my $ is made through FB marketplace. I also have a couple groups I'm connected with there that are very helpful for local political organization and general health. But I really don't do much besides those 2. Commenting, posting, etc. hardly at all. How to start from ground zero when your whole family isn't on board and will still tag you in things, not do a VPN, etc?

  • @lyfandeth
    @lyfandeth 3 года назад +1

    Are there any 3rd part contact management apps that are content to simply sell their apps, and not suck back the data? So by going to a 3rd party add, you can keep it personal?
    Or would you have to keep it in a generic database, excel, etc. file?

  • @megaluria9654
    @megaluria9654 3 года назад

    Hi Rob - wouldn't it be much easier and private to do authentication using a HW stick like YubiKey with no reliance on your mobile phone at all? The way you describe it is too complicated to me.

  • @marcgoodman4561
    @marcgoodman4561 3 года назад +2

    When you register a sim card you'll need a debit card, passport or driving license.
    There is no privacy

  • @JimJones-999
    @JimJones-999 3 года назад +4

    Do the de-googled phones have any back doors to the person who de-googled it? Can the person you got it from access info from it after the fact?

    • @robbraxmantech
      @robbraxmantech  3 года назад +5

      AOSP is open source. I use LineageOS which is open source

    • @jameslynch8738
      @jameslynch8738 3 года назад

      Well if anyone in the chain did it would likely be through a third party, whether it's a vendor, organization and even govs. If it's a targeting campaign you'll see multiple third parties and a huge amount of misrepresentation of collected personal characteristics. The types of attacks will likely vary depending on the nature of potential adversaries. I think it increases in severity depending on the target from bait and gaslighting into full out burn protocol with people staging and reporting. As far as I can tell, everyone ghosts so it's hard to collect info which I guess means it's highly effective.

    • @benhicks9494
      @benhicks9494 3 года назад

      @@jameslynch8738 what do you mean "staging and reporting"? Burn protocol?

    • @jameslynch8738
      @jameslynch8738 3 года назад

      @@benhicks9494 That would depend on how advanced the adversary is.

    • @benhicks9494
      @benhicks9494 3 года назад

      @@jameslynch8738 what kind of adversaries would use these tactics and why? Anyone can be targeted?

  • @AngryIrishman0007
    @AngryIrishman0007 3 года назад

    Should we buy a Iridium Phone and just use the data with another WiFi phone? What are your thoughts on Starlink?

  • @KT-jy3mr
    @KT-jy3mr 3 года назад

    Rob, on my phone I access almost all information, including youtube, through the duck duck go browser and clear cookies after each visit. Also use a VPN. So I can't be tracked using a device fingerprint this way, right?

    • @robbraxmantech
      @robbraxmantech  3 года назад +2

      No. Sorry. Google is working in the background.

  • @TedFreitas
    @TedFreitas 3 года назад +2

    This is all great for the techie type person. However I’m gonna venture to say 95% of the world would never be able to adhere or even implement these suggestions. It’s really scary to realize how far down the rabbit hole we have gone and how much privacy we have lost. Hummmm….

    • @robbraxmantech
      @robbraxmantech  3 года назад

      Zuck knows we're zucked because no one will listen.

    • @xofcenter5576
      @xofcenter5576 3 года назад

      The average person isn’t going to suffer even a minor inconvenience when they can automagically access their “free” services.

  • @youguysaregreat
    @youguysaregreat 3 года назад

    Some agency listens while you talk on cell phone. Most probably through the cell towers. How to know if they are listening to you. If they do then how to stop them from listening?

  • @robby5356
    @robby5356 3 года назад +1

    This may be a noob/obvious question but can a dual sim phone be tracked and have both sim cards compromised even if you compartmentalize the usage of the sim cards?

    • @robbraxmantech
      @robbraxmantech  3 года назад +3

      If it's de-Googled I think it will work. If it's a regular phone, Google can read the security chip, IMSI and IMEI so the device fingerprint is the same

    • @robby5356
      @robby5356 3 года назад +1

      @@robbraxmantech Thank you for answering. I'll remember that in the future and differently go for a de -googled phone

  • @BobJones-dq9mx
    @BobJones-dq9mx 3 года назад

    Can anyone answer this question? What is the name of the governmental platform which transforms an individual to a walking transponder even though the person has no electronic devices, just his new passport?

  • @lyfandeth
    @lyfandeth 3 года назад

    Rob, Microsoft (used to? Still does?) track the internal serial numbers of your computer drives and inventories the graphics card, amount of ram, and other factors to authenticate a Windows serial number is only used on one machine. So it is confirmed that your computer can be identified by internal serial numbers that are unlikely to change, except during upgrades. Doesn't that also provide another level of fingerprinting on computers?

    • @robbraxmantech
      @robbraxmantech  3 года назад +1

      Yes. But the tracking of your social media is done by other parties and they can't access those serial number things from the browser

  • @catalinaleon8040
    @catalinaleon8040 2 года назад +1

    O se ponerlo no se ponerlo soy muy torpe. Base conectarme llo tengo una parato para ver películas pero no sé por Merlo soy muy torpe estoy sola no lose ponerlo

  • @jamee6
    @jamee6 3 года назад

    Is browser isolation worth doing on a cell phone at all?

  • @julyseng5653
    @julyseng5653 3 года назад

    Bad nosy neighbors.

  • @shockingguy
    @shockingguy 3 года назад

    Hey ROB sorry I’ve been so absent 😞

  • @livecrosswire
    @livecrosswire 3 года назад +1

    You do not speak about using a VPN for cell phones using data?

    • @robbraxmantech
      @robbraxmantech  3 года назад +2

      I did explain it, I hope, clearly. It's not as important when on LTE, at least against big tech. Though it may have other importance for security reasons

  • @tomcondon6169
    @tomcondon6169 3 года назад

    Here is a difficult hypothetical, What if you need to have a document notarized, and it has your Social Security number, birthdate, Mother's maiden name, and other personal information? What if the Notary Public sees a need to keep a copy of what they assert is true? What if this N.P. is vulnerable to compromise, criminal, or financial, willing to sell personal information to entities that would never reveal how they gained this information?

    • @robbraxmantech
      @robbraxmantech  3 года назад +3

      You cannot stop your real name data from leaking. that's settled. You can stop correlating other activities to your real name though

    • @tomcondon6169
      @tomcondon6169 3 года назад

      @@robbraxmantech Thanks Rob for taking the time.

  • @HumorousLOL
    @HumorousLOL 3 года назад +1

    Can we change our phone ip address so that the ip address we have emitted in the past are useless?

    • @robbraxmantech
      @robbraxmantech  3 года назад +3

      LTE Ip address is shared from a pool. So only carrier knows who used it at any particular time. It is not an identifier to an outside party. The threat is DSL IP

    • @HumorousLOL
      @HumorousLOL 3 года назад +1

      @@robbraxmantech So basically the main issue is when you are on a desktop on broadband connections? It is ONLY DSL, or is this also an issue on cable internet?

  • @sara1364
    @sara1364 3 года назад

    Have an unknown recovery ph# on Google account? Not sure if peeps.

  • @demonee-ho491
    @demonee-ho491 3 года назад

    about the device ID. What would happen if I have a google phone with a linux os (not android of course)?

  • @diva555sg
    @diva555sg 3 года назад

    So disable 2FA?

  • @robertzitting4547
    @robertzitting4547 3 года назад

    Rob, I haven't heard much about satellite phones , I'm new to your channel but ,would they be a privacy option?

    • @robbraxmantech
      @robbraxmantech  3 года назад +1

      Sure. Expensive and minimal privacy gain. Maybe the main benefit is that the phone does not have apps

  • @diva555sg
    @diva555sg 3 года назад +1

    Free vpn will not be so useful at home cos all devices uses router. So I will need a vpn router correct?

    • @robbraxmantech
      @robbraxmantech  3 года назад +3

      There is no real privacy with a "free VPN" since those are usually proxy servers (which cache your internet activity).

    • @diva555sg
      @diva555sg 3 года назад +2

      @@robbraxmantech thanks for the confirmation.

  • @chazzlidell7653
    @chazzlidell7653 3 года назад

    Jorge Menendez runs an illegal car chop shop. Lol 😆 lol I want to

  • @ratakses
    @ratakses 3 года назад

    Rob, do we know for sure that VPN Providers does not save our Information, or we just assume that?

    • @robbraxmantech
      @robbraxmantech  3 года назад

      There's trust involved. So just so you know, I'm a real person running a VPN service with your privacy in mind. Not a big corporation

    • @ratakses
      @ratakses 3 года назад

      @@robbraxmantech thank you for the answer, now i have a theoretical question: lets say that in the future the west become totalitarian and the governments will go to VPN providers and demand past information or data on users. can VPN providers search and give this information to the government (assuming they do as they claim and not saving any data on users) ?
      P.S your content is a necessity !

  • @gigir6761
    @gigir6761 3 года назад

    I cannot afford to trash my $1,000 phone and buy a de-Googled phone. I struggled to pay for this phone.

  • @catalinaleon8040
    @catalinaleon8040 2 года назад

    No tengo ordenador ni juegos ni internet no funciona nada

  • @TheZualtea
    @TheZualtea 3 года назад

    great

  • @darklotus5309
    @darklotus5309 3 года назад

    Wouldn’t Startpage still be @ the mercy of the echo chamber sanitized search results as google because it’s using google?

  • @GaryCameron780
    @GaryCameron780 3 года назад

    #BuildTheWall :)

  • @danwithjesus
    @danwithjesus 3 года назад

    LOL when i heard zackbook

  • @giovannip.1433
    @giovannip.1433 3 года назад

    This is what supposedly clever criminals should realize - 'they' know you are a criminal. 'They' know whom you are doing deals with. The only reason you aren't being arrested is because the controllers of that information want to make more money, gain more power than waste their time on 'small fry'. e.g. Smugglers 'get away' with it for a bit of time then get caught - how much did they smuggle before being caught? whos' product were they smuggling? When the public 'demand action' for criminality, they throw the public the bones, the waste or expose criminals after they are no threat to 'their' business. E.G. Epstein, Savile, Narcotics...

  • @hikerJohn
    @hikerJohn 3 года назад

    We cannot buy any products or services even from you without it being traceable

    • @robbraxmantech
      @robbraxmantech  3 года назад

      I didn't know that I was selling things that require tracing. I just sell phones and networking products and services.

    • @hikerJohn
      @hikerJohn 3 года назад

      @@robbraxmantech All transaction are traceable are they not? The *things* you sell don't require tracing but the transaction itself does. I'm still watching more of your videos, cant decide if it matters at this point since I'm so old. I do know my friends that are police do not use facebook but there spouses do.

  • @catalinaleon8040
    @catalinaleon8040 2 года назад

    Llo no veo nada no kiero más tontería ni ver películas no veo nada estoy esperando los dineros no puedo ablas ni trabajar ni nada no puedo ver nada menos película no puedo pagarla nada

  • @catalinaleon8040
    @catalinaleon8040 2 года назад

    Llo no tengo ordenador no tengo privado no tengo nada no kiero nada gue me dejes en paz llo no kiero nada más gue lo mío no kiero ser rico Hi libre trankila solidaria Hi en mi casa sola agutito libre de todo los líos

  • @catalinaleon8040
    @catalinaleon8040 2 года назад

    No estiendo chino déjame en paz no tengo ordenador no se tocarlo sin título ni internet ni estudios vucate a un chino gue hay munchos un parado de trabajar más gue llo no valgo nada no me valores tanto sin estudios vucate an un negro Ho blanco meda higual llo estoy en mi casa con mi perrillos chicos ditraida me guta más gue tu trabajo de chinos no lo entiendo nada vucate ha hotro chino déjame en paz no kiero tanto dinero chino no lo entiendo nada ni de letras no puedo ablas nada ni tengo tiempo nada más gue mi perrillos son tan bonitos gue no lo dejo solos nunca me lo llevo en el carrillo de la compra ala calle me alluda atiral del carro abecés tiran de mi rodillas no puedo andas Hi de carrillo son tanbonitos

  • @catalinaleon8040
    @catalinaleon8040 2 года назад

    Todo el mentira solo habla ni lo entiendo nada gracias

  • @suspiciousperson5324
    @suspiciousperson5324 3 года назад

    PLEASE CUT THE MUSAK, ìt really, really, f**ks up we who use hearing aids. Thank you.

  • @Seer645
    @Seer645 3 года назад

    I wish you could limit your videos to 10 minutes.

    • @robbraxmantech
      @robbraxmantech  3 года назад +3

      I can guarantee you that's not going to happen. Sorry.

    • @amosmoses8402
      @amosmoses8402 3 года назад +1

      Rob has the greatest information.. listen and learn!

    • @amosmoses8402
      @amosmoses8402 3 года назад

      @c2s Me as well. Rob is an intelligent man and he does know what he is talking about. It’s a good thing that he is here for all of us so we can learn from him. Much love 💕

    • @amosmoses8402
      @amosmoses8402 3 года назад

      @c2s I agree and they also don’t know the risks of the web, and websites that they are going on.