you can't avoid important talks altogether. This might be in school, in high school, in your job, with a girl/boy friend. If you avoid it at all cost, then you probably don't live your life. The more helpful rule I think is to avoid political, religion, and very personal talks. Unless you know the person very well, or obviously share similar point of view or belief. Like he/she is the member of the same party ) Or you visit the same church )
You're barely scratching the surface with your statement. Average people ignore 99.99% of everything around them, only focusing on themselves and what they want in order to feel good for 5 minutes. They get mesmerized by content, social media, 24 hour news cycle, work, protesters, and taking out their frustration on each other rather than directing it towards the cause of the frustration. Yeah, I'm already on all the lists, it's ok. I'm waiting for history to repeat itself
@@DailyTuna Considereing these last years the darkest side of humans seem to be emerging like people embeded w a psychopathic parasite programming hate. People are changing. Anger, rage, loss of self control, violent, and all positive traits/emotions almost overnight! scary!
I agree, he is the uncle I would want to have. But I think he's mentioned he's had a hard time convincing his relatives on some of these things. They are probably like "Oh no Roberts going on about privacy again" lol. Most people just don't get it.
Something as simple as a rock in your shoe or loosening up ties defeats this. That said, if you are trying to disappear, why would you be anywhere there is an odd biometric collection like gait analysis? Then is the discussion regarding 1 to many or many to 1 searches and database sharing and interoperability. None of which exists outside of a few countries.
actually, that’s a bullshit method, you use a PGP signature using an app like Cleopatra with a K, to send the email from an anonymous email address such as a yopmail account, from a public computer and an Internet café that uses a computer with a different IMEI number as your own, and has no WebCams in the Internet café to identify who was using that anonymous computer. Then you put an image or any other kind of file, such as MP4 or PDF, that has a message hidden inside it as a text file which has been embedded using stenography tools, such as steghide, or outget.. let your receiver know not online, but we wise mouth to ear what his secret password is, and password protect the message, the embedded message in the image meaning password protect the image as well, and password protect the zip file it is sent in in the PDP signature assigned anonymous email coming from a disposable email address such as yopmail… also the other way to be like a ghost is to never ever go on the Internet in the first place
It might work against non-state actors. It will certainly not work against any sort of sophisticated adversary. This was an old amateur terrorist technique widely exposed and defeated over two decades ago.
1) Would be interested in whether to set up your home Internet using TOR vs a VPN. 2) Also how to disable location and whether it needs to be in developer mode. 3) When I showed my friends how to access developer options, they were amazed; perhaps a short video on how to secure your phone in that mode might be of interest. 4) This was an AMAZING video that I am sure will helped many women escape abusive husbands!
I'm sitting on the edge of my seat waiting to see how there can be a discreet method of contact that can remain discreet after you explain it. I feel like, once you explain how it works, somebody performing some surveillance could just add this method to their list of things to look for? This is why i love this channel. Braxman is smart, he is an expert in things I've never thought about in my entire life before seeing his videos
Great video, an essential topic in these days of AI and the hacker jungle that we live in. But there comes a point when the energy it takes to effectively disappear is greater than the energy would take to simply "stand and fight" your pursuer(s), holding your ground or taking offensive action. What you've scratched the surface on is nonetheless essential knowledge to have. Thanks for taking the time to make the video. Also, companies, especially big corporations, tend to have a policy of never actually deleting anything, so when you delete an email for example, it only deletes it "for you", it's still stored on the company's servers or elsewhere if they have a backup system, so good luck trying to delete that too. Also, it's amazing to consider how many 'ordinary' non-tech folks are out with warrants when the government has at its disposal such means. I think there is philosophy and ideology involved thankfully. I've started a philosophy called Total Hacking or the Clear Hat, the colors are clear, or black if it must be on a display or page. It's essentially hacking by any and all means necessary, which aren't limited to the world of tech. Outer space is clear. Snow is clear.
Rob, I think This has got to be the most fun video you've ever made! I love plotting my escape as though I was Jason Bourne or Edward Snowden. As well many good privacy points for general use. The idea of your friend driving you to another state BEFORE the red flags go up is good for getting you out of your state but of course they would be able to retro actively track you by looking at the travel history of your friend before the red flags went up. So they would know your new state and you'd be basically in the same situation again of them knowing your state. My idea would be to buy a used car with cash from some shady guy who doesn't ask a lot of questions lol.
@@robbraxmantech But once you are in the second state wanting to disappear how is that situation any different than trying to disappear from the first state? In both cases they know your specific state. So I wouldn't say you've expanded the the search area but just changed ground zero, the starting point, to a different location.
@@linsqopiring6816 While they are watching your house and the local airports, bus stations, and train depots, you are long gone before they have realized you left town.
@@debbiedowers3927 I get that but my point was once they realize you have left town they can check your friends car's location to see where you went to. So how are you any better off than if you have stayed?
@@robbraxmantech Turn off wifi, data, devices and wrap it up in aluminium foil when you don't use it. Cover all cameras on your gadgets. There are a lot of things we can do to be safe, I can't say what I want here.
@@woke.shaman4532Me too. Make your own; its just a rectangle of cardboard. Send someone something nutty, like a Ritz or Oreo post card. (Just cut out a hunk of the box) The possibilities really are endless. Old physical pictures are great too; I used to send DIY post cards all the time, back in the day of getting film developed.....
But it's good to practice. Like having a 'bug out bag'. You hope to never use it, but as it gets tried out more often, the bag becomes better set up, with what you want in it, to suit your needs.
Possible follow up videos might touch on topics for women who need to disappear and other women who are trying to aid them. This cohort is very real, very under resourced and very keen to learn more.
There is no doubt this teaching is important, and I encourage that it be developed and presented. My own problem is I have trouble understanding some of the details because I'm not smart enough. So I suggest that some thought go into making the information as simple as possible so schmucks like me can better understand what to do.
Thank you Rob...! Your video and every topic highlights huge issues, please don't shelf these. Each of your topics could be expounded into sub video tools from this one. Awesome stuff..! Onward
Rob...i tracked you way back to when you were much younger and i must say that you looked amazing on the Kostelanetz album cover called “Flower Drum Song”.❤️
You gave a lot of good information in your video. Clearly you are very knowledgeable about the technology world, and it is equally clear I am not. I didn't catch many of names of sources you shared, or what they are. Thank you for sharing.
@@robbraxmantech yes very interesting topic facial recognition technology,very hard to cover or alter facial feature's with out drawing attention to your self by people around you,if they have access to databases with traffic camera,passport photos,social media photo posts,driving license photo,is getting impossible to have real privacy
Public transit is antiquated throughout most of the US. CCTV may be present in subways but the cameras might be from the 1980’s or more likely broken since Clinton was President. Bus cams do not have satellite uplinks nor other infrastructure to coordinate with three letter organizations. The main risk would be in big city terminals, not on busses themselves nor at rural stops.
One point I'd make about computers/phones - if they're only linked to your new identity then there's not really a problem in that way. It's once you start mixing pieces of your old and new identity you need to make sure nothing tracks you between them.
@@isitlaw2919 I believe it but may not be conclusive. Ive tried it with aluminum foil and calling my phone, and my car key fob. They were both blocked. Im not sure the exact mechanism thru which your music was played or other methods of sending different waves thru the air but i dont expect an answer here from Mr B as it may impact business on buying his phone, so makes sense.
I don't know if the maildrop is effective because if you sign in from a new location that email account will get an email notifying you of a new sign-in from X location showing that someone else uses that account too.
@@allyfortis that's true but there would stil be a draft saved correct? You could still use it to communicate with someone who has shared login information
In your opinion, when it comes to cameras and surveillance, which is better? A big city, where there are alot of people to hide amongst, but surveillance is higher; or a more rural location, like a country town, where there are fewer people, but also lower levels of surveillance?
@@robbraxmantech Exactly. There will be no hiding in the noise from IOT devices etc in a city. One of the best pieces of advice you gave was to get out of the country and into a less sophisticated country. Do not go to Europe.
Detective from Los Angeles told it's best I leave the country. Because I like tech and figured out fusion center list and I'm now placed on. Too young for this type of life
if using maildrop, don't delete messages as those can be recovered. instead, edit same message in draft and clear text after reading. only if ISP performs backup will msg be tracked. there are very good message embedding into images apps. Just need same app and password to extract.
Please develop further exploration of all these technical issues surrounding evasion of surveillance (location tracking, hardware identifiers, etc., discussed at the end of the video). They all seem core to your mission here, and have relevance even if people do not need fully to disappear from the grid. One thing caught my attention, however. Why do you imagine repurposed Pixel phones (and other Google-exorcised phones) cannot be tracked without SIM cards? In my experience, every computing device can be tracked through the hardware. Maybe I'm misunderstanding, or maybe there is something special about these particular devices? In any case, thanks for your efforts to raise awareness of these issues,
Read the book called Finding God in the quarter mile. It shows how someone ran off with millions and tried to disappear but did get caught by being tempted by more money! Thanks Rob for showing how to do this the right way!
What about the use of Ham Radio, Repeaters, HF, CB Radio, Family Radio, GMRS Radio, Packet Radio, Satellite Phones and data? Can these be incorporated safely?
I recall an episode of a TV series I saw many years ago where an abused wife escaped from her physically violent/abusive husband using a discreet organisation that had a pre-arranged "network" of female members with whom abused women could stay, for a limited period of time, before being moved on to the next person in that network, & before eventually reaching their "final" location. The members of this "network" were all people who were not previously known to the women using this service, & each member of the network only knew the contact details of the next person in the network & the previous person in the network - so most of the network members had no idea where abouts the women they helped, eventually ended up. At the time it seemed to me like a good way for abused women to escape from their abuser - but these days would still be dependent upon the person escaping, observing many of the precautions mentioned in the above video.
Yes, more content like this, please. What about IR LEDS mounted under the bill of a baseball cap to blur any image captured through censure saturation?
Another thing is, every time I see a guy with a hoodie and dark sun glasses and maybe a fake beard I always look 10 x as hard at them lol. The cops are people to so I'm sure they would also. Bit of a heat score. But I guess it's better than the facial recognition deterministically nailing you.
Great video Rob. Please do one about basic SecOps for the normal "not on the run" guy, by device. How to properly configure your PC and phone just to avoid malicious actors, but when you need to use basic tech like gmail, whatsapp or even FB for work. Thanks for teaching us, your viewers.
if you are using gmail as soon as you start typing the data is being sent to google. So if the police are working with google to find you ( they are ) they will be able to see the draft even though it was never sent. A much safer way is to setup a free tor email address and communicate there. Also use your phone to help with your initial escape. I was wanted in france and they use phone tracking first to find you so I jumped in a taxi, headed to the airport but dropped my phone in a subway that was headed in the opposite direction. I would love to hear you talk more about face recognition and client side scanning evasion.
Yea, I was also thinking along these lines. Because I'm sure THEY can access your deleted drafts even if you can't. By "free tor email address" do you have any specific website or just mean you go on tor and get on a website that allows accounts with no 2fa?
Facebook and email could be used to communicate with loved ones if only used while in transit from one location to another, via a non linear route of travel and not to transmit sensitive information. If all you want to do is let your loved one's know you are ok and doing well, this could be used.
I would like to have one of the Bax2 worldwide phones.; Out of stock and no phone number to call and order one directly. Thank you for taking the time to teach us what you understand. Jacqueline
I have 1 golden rule, NEVER talk about anything important to anyone....unless it is in-person.
@weekendwarrior3420 Yeah, scuba might be better.
Or use the cone of silence :)
you can't avoid important talks altogether. This might be in school, in high school, in your job, with a girl/boy friend. If you avoid it at all cost, then you probably don't live your life.
The more helpful rule I think is to avoid political, religion, and very personal talks. Unless you know the person very well, or obviously share similar point of view or belief. Like he/she is the member of the same party ) Or you visit the same church )
@@ТоварищКамрадовСоциалистКоммун I "live my life" just fine, now why don't you go do the same.
its great to live in a free country
You’re like a techie Braveheart!
It’s amazing how people get mesmerized by technology and they ignore the dark side of human nature .
You're barely scratching the surface with your statement. Average people ignore 99.99% of everything around them, only focusing on themselves and what they want in order to feel good for 5 minutes. They get mesmerized by content, social media, 24 hour news cycle, work, protesters, and taking out their frustration on each other rather than directing it towards the cause of the frustration.
Yeah, I'm already on all the lists, it's ok. I'm waiting for history to repeat itself
@@DailyTuna Considereing these last years the darkest side of humans seem to be emerging like people embeded w a psychopathic parasite programming hate. People are changing. Anger, rage, loss of self control, violent, and all positive traits/emotions almost overnight! scary!
Here I am thinking, my digital footprint will show I've watched this video and that will give those looking for me tips! 😂😂
They are the ones who recommended the video to you.
@@Vhgcfbj Well, It wasn't recommended, I actually watch Rob's stuff regularly. I'm probably already on the "list" lol.
@@job1925athe more of us the better. Share it around.
Watch his videos being signed off on Tor 😉
EXACTLY! 😂
Rob, you're the uncle anyone should have! Thank you! 👍
I agree, he is the uncle I would want to have. But I think he's mentioned he's had a hard time convincing his relatives on some of these things. They are probably like "Oh no Roberts going on about privacy again" lol. Most people just don't get it.
@@linsqopiring6816 But dear Uncle, I hAvE nOtHiNg To HiDe 🐑
@@HomelessShoe Ok then go to the bathroom in a glass stall.
Rob is my uncle hehe
Don't forget about gait recognition. Everyone has a unique "walk". So it's not just your appearance that needs to be considered.
Gotta love long skirts 🤫
Hide EVERYTHING you can, the psycho s don't like to work, they are used that we give them in their mouth straight away.
Crutches, a cane or a wheelchair can be very effective & may also offer other benefits in public spaces.
@@QuadMix lmfao everyone in a wheelchairs a spy or a criminal :D
Something as simple as a rock in your shoe or loosening up ties defeats this. That said, if you are trying to disappear, why would you be anywhere there is an odd biometric collection like gait analysis?
Then is the discussion regarding 1 to many or many to 1 searches and database sharing and interoperability. None of which exists outside of a few countries.
Part II needed!!
watch Jesse Ventura's speech
@@AjarnSpencer Which one?
@@AjarnSpencer Jesse Ventura, lol
Very worth it. We are lucky to have you here, to tell us how to not be here, or at least appear to not be here if ever needed.
Used the draft email technique for years at work to keep our communications from prying employer eyes - good to know it has a wider application!
actually, that’s a bullshit method, you use a PGP signature using an app like Cleopatra with a K, to send the email from an anonymous email address such as a yopmail account, from a public computer and an Internet café that uses a computer with a different IMEI number as your own, and has no WebCams in the Internet café to identify who was using that anonymous computer. Then you put an image or any other kind of file, such as MP4 or PDF, that has a message hidden inside it as a text file which has been embedded using stenography tools, such as steghide, or outget.. let your receiver know not online, but we wise mouth to ear what his secret password is, and password protect the message, the embedded message in the image meaning password protect the image as well, and password protect the zip file it is sent in in the PDP signature assigned anonymous email coming from a disposable email address such as yopmail… also the other way to be like a ghost is to never ever go on the Internet in the first place
The second method (staying off the internet) sounds easier than the first one
It might work against non-state actors. It will certainly not work against any sort of sophisticated adversary. This was an old amateur terrorist technique widely exposed and defeated over two decades ago.
@@AjarnSpencer Your last suggestion is the best.
You must be fun at parties. @@AjarnSpencer
All of your work is appreciated. Been watching for a long time
1) Would be interested in whether to set up your home Internet using TOR vs a VPN. 2) Also how to disable location and whether it needs to be in developer mode. 3) When I showed my friends how to access developer options, they were amazed; perhaps a short video on how to secure your phone in that mode might be of interest. 4) This was an AMAZING video that I am sure will helped many women escape abusive husbands!
Thank you Rob....good information
Excellent information
This is absolutely fascinating. More please.
I'm sitting on the edge of my seat waiting to see how there can be a discreet method of contact that can remain discreet after you explain it. I feel like, once you explain how it works, somebody performing some surveillance could just add this method to their list of things to look for?
This is why i love this channel. Braxman is smart, he is an expert in things I've never thought about in my entire life before seeing his videos
I don't plan to disapear but this was really interesting
No, it's not, it's EXTREEMLY IMPORTANT.
Its never planned bro
Great video, an essential topic in these days of AI and the hacker jungle that we live in. But there comes a point when the energy it takes to effectively disappear is greater than the energy would take to simply "stand and fight" your pursuer(s), holding your ground or taking offensive action. What you've scratched the surface on is nonetheless essential knowledge to have. Thanks for taking the time to make the video.
Also, companies, especially big corporations, tend to have a policy of never actually deleting anything, so when you delete an email for example, it only deletes it "for you", it's still stored on the company's servers or elsewhere if they have a backup system, so good luck trying to delete that too.
Also, it's amazing to consider how many 'ordinary' non-tech folks are out with warrants when the government has at its disposal such means. I think there is philosophy and ideology involved thankfully.
I've started a philosophy called Total Hacking or the Clear Hat, the colors are clear, or black if it must be on a display or page. It's essentially hacking by any and all means necessary, which aren't limited to the world of tech. Outer space is clear. Snow is clear.
Rob, I think This has got to be the most fun video you've ever made! I love plotting my escape as though I was Jason Bourne or Edward Snowden. As well many good privacy points for general use.
The idea of your friend driving you to another state BEFORE the red flags go up is good for getting you out of your state but of course they would be able to retro actively track you by looking at the travel history of your friend before the red flags went up. So they would know your new state and you'd be basically in the same situation again of them knowing your state. My idea would be to buy a used car with cash from some shady guy who doesn't ask a lot of questions lol.
The idea is to just expand the search area. You do not stay in the State where your friend drives you. But it's just a place to disappear from
@@robbraxmantech But once you are in the second state wanting to disappear how is that situation any different than trying to disappear from the first state? In both cases they know your specific state. So I wouldn't say you've expanded the the search area but just changed ground zero, the starting point, to a different location.
@@linsqopiring6816 While they are watching your house and the local airports, bus stations, and train depots, you are long gone before they have realized you left town.
@@debbiedowers3927 I get that but my point was once they realize you have left town they can check your friends car's location to see where you went to. So how are you any better off than if you have stayed?
lol yes. or walk, hike, take a bike, etc.
Bicycles hide your gait and extend your range by orders of magnitude, plus they're fun!
My wife asked me about this yesterday. Now I have more information ❤
...and your spyfoon was hearing the conversation si they showed you this.....scary right?
Very interesting deeper dive into disappearing. I would be interested in learning more about the specific points.
I'd LOVE to hear more on this. LOVE your content.
love the video Rob could listen to you all day. wish these types of videos would be just a wee bit longer?
I'm shortening it actually to only 20 minutes give or take. Better for YT. But allows me to make more videos too.
@@robbraxmantech Turn off wifi, data, devices and wrap it up in aluminium foil when you don't use it. Cover all cameras on your gadgets. There are a lot of things we can do to be safe, I can't say what I want here.
@@robbraxmantechwe cld all get same masks suits wig and hope it catches on .😂
You are right. Its absolutely worth getting to know the options of creating a cloak and dagger.
Great video, please go deeper on each section.
Great video, it's a very important topic that will prove useful to at least some people watching this. I'd love to see more videos about it.
Excellent, please keep doing videos on the matter.
Mail your credit card to a random person on the opposite side of the country. Maybe they will start using it. That's a decoy.
Great info as usual.
“Disappear” is an absolute term. If you are trying to stay in touch with family or friends, you are not trying to disappear.
I love sending post cards
@@woke.shaman4532Me too. Make your own; its just a rectangle of cardboard. Send someone something nutty, like a Ritz or Oreo post card. (Just cut out a hunk of the box) The possibilities really are endless. Old physical pictures are great too; I used to send DIY post cards all the time, back in the day of getting film developed.....
It isn't an absolute term. Unless you can become invisible, that's what disappear means. Everything else falls under the umbrella of HIDING.
But it's good to practice. Like having a 'bug out bag'. You hope to never use it, but as it gets tried out more often, the bag becomes better set up, with what you want in it, to suit your needs.
excellent.. so very much needed
Possible follow up videos might touch on topics for women who need to disappear and other women who are trying to aid them. This cohort is very real, very under resourced and very keen to learn more.
excellent presentation; Thank you Rob and God bless.
Love you're hard work presentation Rob
There is no doubt this teaching is important, and I encourage that it be developed and presented. My own problem is I have trouble understanding some of the details because I'm not smart enough. So I suggest that some thought go into making the information as simple as possible so schmucks like me can better understand what to do.
Thank you Rob...!
Your video and every topic highlights huge issues, please don't shelf these.
Each of your topics could be expounded into sub video tools from this one.
Awesome stuff..!
Onward
Cool video. I’m pretty new to tech but this is all very interesting content, 👍
Rob...i tracked you way back to when you were much younger and i must say
that you looked amazing on the
Kostelanetz album cover called
“Flower Drum Song”.❤️
Awesome! Keep it coming! 🇺🇸
Rob Thank you for the valuable information. Good to know.
This is great content. Always enjoy your videos.
You gave a lot of good information in your video. Clearly you are very knowledgeable about the technology world, and it is equally clear I am not. I didn't catch many of names of sources you shared, or what they are. Thank you for sharing.
Thank you for this important information. Even if you don’t want to disappear lowering your visibility is a good thing.
yes, please, do more on this topic
| i'm interested this content make part 2 on this topic |
He said he could do a whole video on any one aspect. I say that would be a good idea!
I'll talk about the particular problem with facial recognition next
@@robbraxmantech yes very interesting topic facial recognition technology,very hard to cover or alter facial feature's with out drawing attention to your self by people around you,if they have access to databases with traffic camera,passport photos,social media photo posts,driving license photo,is getting impossible to have real privacy
Mistake = public transport is fully covered with cctv, probably fitted with face recognition software.
Public transit is antiquated throughout most of the US. CCTV may be present in subways but the cameras might be from the 1980’s or more likely broken since Clinton was President. Bus cams do not have satellite uplinks nor other infrastructure to coordinate with three letter organizations. The main risk would be in big city terminals, not on busses themselves nor at rural stops.
DON'T show it to them. (face).
We can do a lot of things to prevent these things happen
Easy fix wear a covid mask sunglasses and hat
Everyone’s house has a camera out the front these days
Thank you for this; please do more!
Loved this video hope you do more on the subject
I would like to hear about your opinion and choices for voice and face recog prevention softwares ( for use in meetings etc )
THIS!
Thank you for your time and effort to help us out. More on the type of phone to get and how to use it
One point I'd make about computers/phones - if they're only linked to your new identity then there's not really a problem in that way. It's once you start mixing pieces of your old and new identity you need to make sure nothing tracks you between them.
Would a faraday bag/barrier be an effective means of preventing an electronic device from giving away ones location? (asking for a friend)
I tried a good quality one , wrapped my phone tightly in it and waited for the music (on line) to stop , hour later , still playing
@@isitlaw2919 I believe it but may not be conclusive. Ive tried it with aluminum foil and calling my phone, and my car key fob. They were both blocked. Im not sure the exact mechanism thru which your music was played or other methods of sending different waves thru the air but i dont expect an answer here from Mr B as it may impact business on buying his phone, so makes sense.
I think your fridge is better
@@WN_Byers if things got that bad, I think I'd just drop it in the ocean or something
Aluminum foil.
Fantastic information! How does one change their identify?
Fake ID.
Thank you for this video! 👍
The mail drop sounded particularly useful if you have close people
I don't know if the maildrop is effective because if you sign in from a new location that email account will get an email notifying you of a new sign-in from X location showing that someone else uses that account too.
@@allyfortis that's true but there would stil be a draft saved correct? You could still use it to communicate with someone who has shared login information
In your opinion, when it comes to cameras and surveillance, which is better?
A big city, where there are alot of people to hide amongst, but surveillance is higher; or a more rural location, like a country town, where there are fewer people, but also lower levels of surveillance?
In the video I said "smaller". I'm thinking really midsized towns. Not the major cities.
@@robbraxmantech Exactly. There will be no hiding in the noise from IOT devices etc in a city. One of the best pieces of advice you gave was to get out of the country and into a less sophisticated country. Do not go to Europe.
You’re the man!! And jay rose is right bout that!!
More please... thanx
Detective from Los Angeles told it's best I leave the country. Because I like tech and figured out fusion center list and I'm now placed on. Too young for this type of life
New member and plz continue with detailed videos
Solid message brother
Nice! More videos like this please
Penn and Teller approve this Advanced Tech Techniques.
if using maildrop, don't delete messages as those can be recovered. instead, edit same message in draft and clear text after reading. only if ISP performs backup will msg be tracked. there are very good message embedding into images apps. Just need same app and password to extract.
thank you for UR advice informative
Plz consider doing a review on the Quetta browser sometime.
Please develop further exploration of all these technical issues surrounding evasion of surveillance (location tracking, hardware identifiers, etc., discussed at the end of the video). They all seem core to your mission here, and have relevance even if people do not need fully to disappear from the grid.
One thing caught my attention, however. Why do you imagine repurposed Pixel phones (and other Google-exorcised phones) cannot be tracked without SIM cards? In my experience, every computing device can be tracked through the hardware. Maybe I'm misunderstanding, or maybe there is something special about these particular devices?
In any case, thanks for your efforts to raise awareness of these issues,
Always the best uncle Rob brax❤
Read the book called Finding God in the quarter mile. It shows how someone ran off with millions and tried to disappear but did get caught by being tempted by more money! Thanks Rob for showing how to do this the right way!
@stizelswik3694 If you're hiding from god I would definitely use tor and a vm.
When you need to disappear, say GG to your Steam Account... 😕😄
What about the use of Ham Radio, Repeaters, HF, CB Radio, Family Radio, GMRS Radio, Packet Radio, Satellite Phones and data? Can these be incorporated safely?
A reflective blanket will stop heat cameras,
For a very short period, yes. But heat is still going to accumulate and/or be dispersed from underneath it so you will not be hidden for long.
Thanx Uncle Rob
Thank you
COMMENT: keep up the good work very informative.
I recall an episode of a TV series I saw many years ago where an abused wife escaped from her physically violent/abusive husband using a discreet organisation that had a pre-arranged "network" of female members with whom abused women could stay, for a limited period of time, before being moved on to the next person in that network, & before eventually reaching their "final" location.
The members of this "network" were all people who were not previously known to the women using this service, & each member of the network only knew the contact details of the next person in the network & the previous person in the network - so most of the network members had no idea where abouts the women they helped, eventually ended up.
At the time it seemed to me like a good way for abused women to escape from their abuser - but these days would still be dependent upon the person escaping, observing many of the precautions mentioned in the above video.
Thanks
Very useful info, thanks
I rolled my eyes a lot during this video.
Yes, more content like this, please. What about IR LEDS mounted under the bill of a baseball cap to blur any image captured through censure saturation?
Wasn't Petraeus love affair discovered while he and his mistress Paula Broadwell used the same techniques as you suggested to communicate?
I’m old and way behind the curve . I need to learn as much as I can as fast as I can . About communication tech. Where should I start?
What no Kali linux, proton, Tor, mesh network?
He did mention some of those things.
"Sunglasses" don't work unless they block the IR spectra.
you get a tan line they are uv blocking.
@ashyslashy5818 correct. There is one retailer I've seen that specifically markets IR block security "sunglasses".
Another thing is, every time I see a guy with a hoodie and dark sun glasses and maybe a fake beard I always look 10 x as hard at them lol. The cops are people to so I'm sure they would also. Bit of a heat score. But I guess it's better than the facial recognition deterministically nailing you.
Great video Rob. Please do one about basic SecOps for the normal "not on the run" guy, by device. How to properly configure your PC and phone just to avoid malicious actors, but when you need to use basic tech like gmail, whatsapp or even FB for work. Thanks for teaching us, your viewers.
if you are using gmail as soon as you start typing the data is being sent to google. So if the police are working with google to find you ( they are ) they will be able to see the draft even though it was never sent. A much safer way is to setup a free tor email address and communicate there. Also use your phone to help with your initial escape. I was wanted in france and they use phone tracking first to find you so I jumped in a taxi, headed to the airport but dropped my phone in a subway that was headed in the opposite direction. I would love to hear you talk more about face recognition and client side scanning evasion.
Yes. Do not use Gmail.
Yea, I was also thinking along these lines. Because I'm sure THEY can access your deleted drafts even if you can't.
By "free tor email address" do you have any specific website or just mean you go on tor and get on a website that allows accounts with no 2fa?
I have a degoogled phone from Brax store. How can I operate it without a sim card?
An external VOIP provider over a VPN?
Facebook and email could be used to communicate with loved ones if only used while in transit from one location to another, via a non linear route of travel and not to transmit sensitive information. If all you want to do is let your loved one's know you are ok and doing well, this could be used.
I would like to have one of the Bax2 worldwide phones.;
Out of stock and no phone number to call and order one directly.
Thank you for taking the time to teach us what you understand.
Jacqueline
nicely done
ty brax !
You should research the privacy with Live voice mail. I don't know if this is a privacy tool or not.
No. Won't work
How does one stop remoye netual monitoring v2k
How To Disappear: Advanced Magician Techniques
Please do a video on clynside scanning 👍
Scary just thinking about thid kind of life
✨✨💖✨✨thank you, reassuring if I ever need to disappear, always love your content...in this twilight zone world, lol 🤣 19:39
Out of pattern…lol, some of us change patterns because we have gotten in a rut… take the scenic route!
I made sure to watch this in incognito so no one knows I'm here.
Encryption on all messages is key
ويمكرون ويمكر الله والله خير الماكرين...