@@sumrandomguy4860 VPN is worthing 0 because if the VPN company gets served with a warrant, they will have to comply and give your own personal IP address.
@@abhisheksathe123 I just kept it Short Brother. You should understand it. Overall tryna act cool is not good bro. I know what the title says. I ain't high. And I ain't telling something bad brother. Thank you.
A couple of other ways: post letters; communicate with people by going to see them; shop by going to local stores; bank by going to the bank (if there are any left); grow what you can (salad stuff is easy and you can even grow it in an apartment); slow ourselves down, get off the click-shop, rebuild communities. Get on two wheels to move around: scooter for short distance, then pushbike, e-bike, motorbike. All good for the planet and us (careful on the motorbike). The internet has only been around for a tiny amount of time yet we now spend all our time on it (like me now). We could try getting out a bit more. Might be good for our mental health too as well as physical. For all internet uses though, do what Hallden says.
You gotta go to China or Singapore or Hong Kong and wear mask, and you will just look like anyone on the street. No racism, just saying. I am Asian myself. When I wear Clark Kent Glasses, no one recognizes me and some mistake me with other person.
You’re spelling your name wrong in Japanese. You need a う after the りゅ if you want your name to say “Ryu”. Also note, using hiragana will make you look more like a preschool child or a teenage girl than an adult. But if you make it kanji, the Hayabusa part is already kind of cringey, so it will make it look even more cringe. I’m Japanese. You’re welcome.
Extra added layer of security you can add to your passwords is to have your passwords in a foreign language, like Spanish or (romanized) Chinese. The further from your mother tongue and the less popular, the better. Good example is to find a band like The Hu that sings something like Mongolian, use a romanized version of a line from one of their songs, and then encrypt it.
@@what.anything Yeah, that's... that's why I said use a romanization of your specific language. I'd be shocked if a website allows you to use 咖啡因眼淚 as a password, but you can just use the pinyin for it, "kafei yin yanlei" and then encrypt it by changing like the K, and the N's to like a 7 and some #'s. Can do this with basically anything you want to just by going to Google translate (its inaccuracy being a benefit here) and writing down the Roman letters it puts for the pronunciation aid. It's super easy, though I would recommend putting it on a piece of paper just in case Google fixes a blunder it made that just so happens to Thanos snap your password out of existence.
Couple things not mentioned is to shut off your telemetry data inside your OS. Normally a stealth system requires this and should read "Your system has achieved a perfect "TruStealth" rating. Not a single packet - solicited or otherwise - was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice." You can also shut off netbios over tcpip in your adapter settings so you are not broadcasting, and hiding your ssid so you are not broadcasting your connections name through wifi discovery.
It is so important to police yourself online - never use your real name anywhere, never post a photo of yourself, never give out your exact location. If you use social media, again, use a "sounds like a real name", keep everything turned to Private.
Not really i don’t care if business have my information they have millions of others also I’m not some dark web hacker so I don’t need that much privacy
Yeah bluntly speaking I don't care if someone knows my name/ where I live as long as they 1) obtained that information from me. 2) are not freely giving it out / selling it. 3) have it stored in a secure manner.
@@kon6492 Most of them safely store it, I dont give it to those that have a history of breaches etc. And I also dont give sensitive information to companies that dont promise to not sell it.
Been in IT since 1982 and in theory this is an excellent video and I commend Kalle for doing so especially unlike a good deal of IT RUclipsrs on here, who mainly want to show off, get attention and aim for sponsorship plus he does not hide it requires having the knowledge, effort and time to do so. Unfortunately as is with so many IT professionals I taught in my time, simply can't grasp that non IT people just want to 'use' IT to do what they want, as oppose spending additional time and effort in being able to do so. That is why even though we have so many utilities and techniques to make passwords more secure, people as I even do (and I used to teach security) now keep a small book with them all written down as we have to change them on an irregular basis. Just like a neighbour I once had, who never actually used his car (driving his wife mad) as he was always tinkering with it, in his garage, to make it run better. The other thing is that most users who wish to use all the aspects of the Internet now find to do so, have to abide by the rules, wishes and requirements that are for the benefit of the provider not the user. A classic example is how banks have totally reversed the relationship, where once customer was king to them now. Kalle's suggestions are valid but most major websites know this and have paid IT software and hardware developers to creat 'hoops' that we must jump through to use them which if you have sensibly carried out what Kalle has stated you 'AIN'T GETTING IN'.
There's another couple of aspects he doesn't cover. Tracking by apps, and cross-correlation of your information with other people. For instance, how many people have your phone number, and have entered it into their phone listings? And do they have utilities and apps that they use to make their lives easier and allow them to share their phonebooks with them? Or their contact lists for email? What about apps that you may have in common with your burner phone and your normal phone, despite not having them on in close proximity to one another? Oh yeah, there's also an algorithm that is used by intelligence services that correlate one phone turning off and another one turning on in close proxmity both spacially and temporally (time). And what about patterns in common? Do you have a group of sites you like to visit and are used on each phone/computer? Would your browsing history get scraped by malware? Do you pay bills online for utilities locally near you? Have you noticed that credit card transactions require phone numbers? And license plate readers and facial recognition, as well as gait tracing (the way you walk) can be used to identify you under a ubiquitous surveillance environment. Some interesting concepts covered in the show "Person of Interest" where the surveillance of everyone is a goal by intelligence agencies.
@@justanotherhuman3668 here's what I've (hypothetically would) have done over the years to avoid those exact techniques @Ju M mentioned: my phone had a pretty predictable pattern. At 10PM it would enter quiet mode and that silenced notifications and I'd typically put on a UFO doc to fall asleep to. So from the outside looking in, I was asleep. I always used burner laptops/phones/hotspots to conduct business and swapped them out frequently. Laptop had Tails (no Windows/MacOS/etc). I never downloaded Tails from a machine or browser account linked to me and always used a fresh download on a new USB every time I swapped laptops. Some will say that is overkill. I would retort that person never took a 500-600 computer forensics course. Business was always conducted during sleep mode and I left my smartphone at home and went to truck stops (Flying J, Loves, TA, etc). My burner never got turned on until I arrived. Obviously I was using TOR unless the latency was too much for what I was doing at the time was rare but did happen. I'd never stay longer than 2 hours even if I wasn't done. I'd go to the next truck stop if time ran out. I went to well traveled truck stops, ones that were busy all night long. The more crowded the better. I had a coin and dodecahedron (D12) dice that I'd flip/roll to determine which of the 24 truck stops I frequented within 150 mi of my house I'd be going to. Heads was the number on the die, tails was 2x the number. I did that so no pattern could emerge and I never went inside to buy anything or go to the bathroom nor did I buy gas. All the BTC I used came from Local Bitcoins (RIP). This was long before Monero. Before BTC, it was forums like Shadow Crew and trust lol. Hypothetically.
Am not gonna lie, i sat and watched this whole video and this guy spoken everything pertaining to becoming truly invisible online. He didn't miss anything out, this is literally the sauce explained yo👏🏼👏🏼👏🏼 well fu*king done❗️
It is tough to prevent data being tracked and hide info. Literally just whatever it may be related to the person (especially personal information) that is used for any purpose can blow one’s personal information and status. So far this is the best video I’ve seen and one of the many that is useful which I learned from.
Nice upload, succinct yet easy to follow.... Highly recommended for anyone else with a short attention span or others who may have naively spent years feeling they have nothing to hide.... subsequently allowing many years of social-media voyeurism erode any belief in, or concerns for online privacy in 2022. Much appreciated!
Liked the video. The password creation system was good. I was taught a system many many years ago. Name Number symbol(s) First step is choose four names. They can be a name of anyone you know preferably, the first names of Grandparents or Aunts or Uncles or long lived pets like cats or dogs. The names must be at least 6 character's or longer each Look at the four names and notice which letters are common between the four. Each name must have at least one character common to the two we will choose (for example the letter O or E) If one of these names does not fulfill this rule then find another name. With all four names you have the first part done. Second step - Pick four numbers you can remember They will represent the year and month that someone was born that is in your family network. Look at the four numbers and notice which characters are common between the four numbers such that each number has at least one character (for example the number 3 or 2) Third step - Choose two special characters. Pick ones that are in the same place with the most common types of keyboard that you will use. In this example we will have ? and > Avoid using things like full stops and commas as they are difficult to see Next you need to establish a substituion rule for the characters so you can disguise the passwords. For my example I will choose - o and 3 and ? will be replaced by ** e and 2 and > will be replaced by == Always use two or three substitution characters together. Never just the one. I now keep a small notepad with the four names and four numbers. But use the disguise substitiutions in those names and numbers when writing them down. When a password is created it will always consist of the name first, followed by the number with the special character(s) at the end. Now we will say that we have made up a password from my grandad's name and my fathers birthday with the special character ? from my choices Fredrick0259? On the website I will enter Fredrick0259? To keep a record of this I would write Fr==drick0==59** Now, if anyone comes across Fr==drick0==59** in my house, work (or on my phone) they do not have the actual password. You will need to create at least two passwords. The first one is for social uses such as email and Facebook. The second one is for cash websites such as paypal or banking. Once a year I change out the passwords. Although I have gone longer. The names and numbers are writen in a small notepad. I also keep a copy of this in my phone. The special characters are kept in my head This notepad will also have the old passwords in case I forget to change out a password for a site after not having been their for years. To create a new passsowrd I pick another name from the list and a number (they are chose at random). Then choose the special character(s) to end it. The final trick with this system is that I can create shorcuts on my PC with the name editied to include the disguised password to act as a hint. The shortcut might be labelled as My Gmail - Fr==drick0==59** With these shortcuts copied to a memory stick I can have online access at any PC with the passwords easily to hand. I have been using this system now for nearly 15 years. The same four names and numbers. Once you get used to it there is no need to worry about remembering passwords current or way in the past. To show how well this works - Using the example above. What is Ge**rge0==64**== It is worthwhile noting that this whole system can be reversed and still achieve the required list of passwords and maintain security. You would now write the undisguised passwords in your notepad and on your shortcuts. The disguised passwords would now be used at the website.
Looks good but Fredrick and George can easily be deciphered . Guessing 1 number easy. Yeah, the question mark - they’re able to run info quickly. I think you were lucky you didn’t get hacked…. Right direction- just need more.
I recommend changing your email occasionally too, it's very easy with outlook/Gmail to add an alias email, make it primary, and delete your old one. So if your email has appeared in any data breaches, it's gone. But you still have access to everything with very little effort
@@RohakGaming oh now that i reread who you @ and how his comment isn't available it makws sense. Thought you said "didnt ask dont care" to the first main comment .
I used to do my passwords like you describe. I had a handwritten list of 1/3-passwords for every site or service. Another 1/3 of the password was derived from the hostname or domain name of the site, and the last 1/3 of the password was a constant I had memorized. I had a mental algorithm for mixing them together. Then I found a better way. I just had raw passwords written down for each site. I would then truncate its 256 bit hash down to size, and use that as a high entropy "random" alphanumeric password. Then I discovered offline password manager. Their database is encrypted with a main password (which I handled as before). But each sites individual passwords contained therein were randomly generated ascii passwords. They also store TOTP keys to generate 2FA codes as an authenticator app. They also store direct url links so phishing becomes an impossibility; never sign in through any link other than the one you stored in the manager. You can also get creative and have an independent, memorized password (just a character or two) that you can prefix to the password stored in the manager. Ive even encrypted my entire password manager into a veracrypt volume.
Yes I use Bitwarden's pass generator, and implemented some weird systems for memorizing 128 character pw's. Just a part, then I combine both. Also I use long complex pw's + biometrics.
Using the plus symbol + for concatenation in email addresses IS actually formally part of the standards, making it easy to create one purpose email addresses. But major ISPs like Goggle will reject these. Goggle also ignores using a period . as a separator despite that also being a required standard.
what are you talking about? first of all, Google is not and never was an ISP, second, they absolutely do allow you to use the + character in gmail, so idk what are you talking about
I use hash encrypted passwords. For example I want to use "the final countdown" as password, then I encode it with sha512 or sha256. Then get a long hash and I use it as password. Only I know the "real password", which I am easily able to remember and to encode with sha512/256 to the password I use on web. Cool video! 👍🏻
That means that your password is "real password" + "fake password" + your encryption algorithm. Not bad, because some hacker would need to put 3 unrelated info together to break the security.
@@dhay3982 *WE DO NOTHING !!! THE PC DO 99% OF "DECHIPER"* *EVERY PASSWORD IS A JOKE* *EVERY PIN IS A JOKE* *THERE IS **#NONE** SAFE THING ON A "COMPUTER" ...OK* *THE POINT IS ....* *DO NOT WRITE "ANYTHING" ON "COMPUTER* *...... WHO CAN GET YOU SELF KILLED .......* or *...... CAN GET YOU #30 YEARS IN **#JAIL** ....* *(NEVER ..OK !!)* *THIS IS THE "ONLY" 2 THINGs TO **#REMEMBER** !! FOR LIFE* AND I KNOW A "LITTLE" ... ABOUT #IT .... oooh WHAT is .....this .!!.. (clash of clans) (club penguin) (no end) HAVE A GOOD DAY ... YOU
I used a password system where you think of a word and just add the date of that day in front and the state you're in(as in drunk, happy, sober, etc). This worked for me so far
really great video as always! I love how you trigger the interest with some general interesting thumbnail and proceed to explain it in detail in the video. Keep up the good work man! Love from Italy
To create your own proxy you can rent a VPS server somewhere in the cloud and all your internet traffic will appear as if it came from that VPS server.
The video is great! Just want to add that you can create Gmail accounts without phone number. On signup on a new (or after factory reset) Android device, while setting up, you can create a gmail ID without giving a phone number. Also temporary disposable email accounts can be of great help where you only need to create account and use only once
One of the biggest problems for remaining private is Hardware,Software,Program,File,Data Fingerprinting. Giving misinformation is the best way but it's getting harder to do, if you have not already done this like 12 years ago then it's to late now. If your face is not on line now then put it on line, after you have tweaked you picture so it still looks like you but AI cannot match it to you. You need to put out your misinformation as soon as possible so it's accepted as you, then when it securely given without you consent to others it's then accepted as you and gets imbedded as you in the system. Then until your misinformation is 100% removed from the systems so it cannot be auto replaced by any system you are a lot safer. It's way better to hide in the crowd than hide on your own, It's only secrete if no one else knows.
i mean the last level could be used against some creeps from like darkweb or someone you made mad. For example if you knife someone in csgo he wont be able to trace your home
@@kallehalldenassistant7578 Lmao you seriously try to lure people into scam using channel that is about tech? (I mean, u probably won't answer cus it's bot but still lmao)
Becoming anonymous is really, really hard. All that things you said works only if you're trying to avoid corporate companies. YES corporate companies. They will have a hard time figuring who you are and making your profile stronger. But government and sometimes other companies will track you down anyways. It might be the way you type or other patterns you follow. And avoiding cameras are also very much impossible. Remember you walk in a certain way. You have favorite coffee or drinks. It's not hard to track you down.
This was about digital invisibility. Not literal social invisibility. There’s a video on _that_ topic made by a former CIA agent and it showed just how much more difficult it is to absolutely vanish altogether. Most of it had to do with eschewing the digital environment completely, going cash-only, and mostly being a complete loner.
nah just buy a whole outfit with cash through people you know, walk with rocks in your shoes into a starbucks with the anonymous clothes + mask and hide the raspberry pi, after that just stay on a VM or RDP with your proxy/vpn (preferrably mullvad vpn) when commiting crimes, and try to stay on TOR as much as possible. also change your cybercrime persona around every year or two and get completely new proxies. if you manage to do this without doing anything dumb like posting pictures anywhere you'd be very near impossible to track through governments. the only way to get you would be through opsec fails or through investigation of where your money comes from, but even if they raid you make sure to have your whole PC encrypted through veracrypt. remember all this is a bit overkill if you arent making over 1m/year or more through cybercrime, if your making less then that feds wont really care unless you really make a name for yourself in the time you spend building your personas or if you threaten national security. so nah tracking you down through the internet would be pretty hard for the government if you try hard enough
lol its a joke but its also not a joke. I've been coming across so many other serious issues that have that same affect. My fault you didn't even say it was a joke - I guess its just the idea that many people will read your comment and assume it is a joke
8:39 If you don't trust a password manager you could just use a password protected encrypted folder. A lot easier then building your own password manager. Only problem is virtual memory could cache the data in plain text on the hard drive.
Another way to save your password is saving it inside of an image on another device, this allows you to use a very complex password. While being pretty safe to use.
Stealth Phones are also an Option. You can buy them from some trusted companies, and this is the most important step. They change your IMEI, connect to the furthest cell tower possible, making it impossible to triangulate you, they do not have any hardware IDs and do have encryption features. However you're essentially paying 600bucks for a tuned Nokia, which is safe Edit: It also doesn't offer internet access, updates or anything of that sort
As you have mentioned the trade-offs of enhancing security at the expense of user experience is what will keep people away from these practices. I find myself in that group of people because I want a good time and I have nothing to hide. Anyways, I do use a password manager (because it’s just easier) and a vpn (to get content from the other side of the world). Thank you for the suggestion about multiple emails I could use it for separation of concerns purposes
Could you make a video about erasing your online identity? Like the process and steps it would take to delete as much info about yourself that on the web available so its easier to become invisible without much worries
This went from 0 to 100 real quick 😂 Like from tips to be secure on the net to outright being a cyber criminal. Like tips on how hide your face and stuff lmao
To be invisible on the internet is impossible because you always have clues to know who you are, not even Tor can make anything to you, you can only disguise your identity
Why was Bitwarden not mentioned? Also just use the security questions fields for other passwords and save them somewhere else instead of answering them.
This video was full of flaws Putting a RPI in a random starbucks to protect your self from something that is false? What TF thats the whole reason of having 3 nodes on tor And nodes are still just proxies
Here’s a hard question for you, if a company can provide end to end encryption for your IP address and packages.. how hard is it for one to just do it themselves?.. and would you consider making a video at least explaining the complexity of doing so? Thank you and bye ✌️
yeah loads have these companies have extremely sensitive data and ever since working from home we all have vpns so there must be a simple way to just browse and do everything privately... however I guess when we use company laptops then we're less likely to do anything else other than work related activities on the laptop and so less likely to get hacked
When I make really long random passwords I just memorize the rythm of movement that I make when I'm typing the password out. I don't know half of my actual passwords but I know the hand movements for them :)
The problem is if you don't access that site regularly then you can't have muscle memory for that site, so you may forget the password of a site that you haven't accessed for years.
@@LakadMatatag2702you'd be surprised... I've recently logged into an account that I hadn't touched in two years and I typed the password as if I had been doing it every day. Muscle memory lasts a long time 😌
I thank U so much for this information & with that I'm pretty much a beginner to the information.but i'm really determined to give it a GO! Thank you for your time & information. Mr. Hop....
I didn't watch the video but here are my tips: - Have multiple emails, - Redirect some of your request to TOR/proxychains with dnscrypt(most of TORs proxies does not encrypt the DNS so you can find someone just like in paper chase game)
No those are the people who are pulling their hair out from him recommending paid cloud based closed source password managers after he scared people with the idea of remembering hard passwords instead of jumping to the subject of self hosted or offline open source pass managers such as bitwarden or keepass. Or him telling that the exit node on tor can see you and you need a proxy. No they can't that's the reason why you are routed thru 3 random computers ran by ordonery people from home. Those are also proxies and they are not hiden in a random starbucks (What TF) Trafic is deencrypted and reencrypted on each node. Nodes owned by the same person are not allowed to connect to each other and get black listed if they do. Also evil exit nodes are non existent and even if they dont get insta banned before verified they wont be able to do anything anyways But that no concern anymore seeing dislikes since youtube is a crybaby over rewind and hated goverments and companies are also angry over seeing crap ton of dislikes
I would just add being aware of threats and always looking for them. Obviously phishing attacks are very popular atm. We done a phishing test on our workplace and far too many people clicked the links.
Great video as always! I'd like to add to the email part in that Simplemail can be used to create email aliases, which essentially allows you to create "new" emails that people can send mail to, but it will get forwarded to your actual email address, thus allowing you to in reality still only manage one email. Gmail has this built in as well I believe.
Firefox has Firefox Relay now, user created "burner" email aliases that forward to an actual email address. You can one-time use aliases as and when required or keep some standard ones e.g. one for shopping, one for extortion, two for porn, etc. ;-)
So, google (and possibly others) have an AI that is used to analyze ones text to reveal identity, which they use to connect activity across the internet. There are two layers to this. One is the scanning of your typed text for similar word usage, grammar, spelling, vocabulary, sentence and paragraph structure. The other is a real-time live scan of your active typing (you already know google does real time search query feedback), which they test for things like cadence, typing speed, your typing errors (even if you correct them), and any patterns among these, generally your typing and writing style before you even hid the submit button. You can circumvent the second technology by pre-typing your text in notepad before copy-pasting it into the web. There isnt much you can do about the first technology though, outside of going out of your way to sound unlike yourself.
I used KeePass for a long time, then Dashlane and then I finally migrated to Linux, made an RSA key pair and stored all passwords with GnuPG. There is a useful "pass" script working on top of GPG. The passwords are simple binary files (encrypted) and can be easily transfered between machines or synced with Git. Of course, it's better not to show your files - then a LUKS-encrypted file system on your OS drive and thumb drives comes in handy. There is also a great password generator utilities like "apg" and "xkcdpass" that can make rememberable passwords for you that are strong against dictionary attacks. If you are really paranoid, there are privacy-oriented distributions like Tails.
At point 17.01 you missed a golden opportunity for all the Tolkien fans. I was SO sure a few times you will say it: "but to disappear entirely, that is a rare gift". Very instructive video by the way. I especially liked the part about replacing a letter with a group of special characters. Very simple and useful.
I have an alternative to the last step of complete invisibility, you can combine VPN service with Virtual Machine, on a VM you can set up everything which could be used to track you, so that way you become completely invisible
Major premise is incorrect for why you should do this. It is NOT the individual that is doing something illegal. It is a government/ state/ bad actor, etc that is engaging in illegal activity. This is why most individuals do need to do this. Think of communist/totalitarian states of old and the new ones rapidly emerging.
It is NOT until he even gets to the described "3rd level of anonymity" that anything you just said could be loosely applied. If you have a burner cell, and or laptop, avoid family and friends as to not get filmed, so on....you prolly doin sumthin, lol.....allegedly
Hi. I have a question when it comes to having multiple email addresses. Is it acceptable to have multiple aliases as email addresses? For example, Protonmail has this feature (in the paid version) where you can create multiple aliases which would act like having multiple email addresses. The question is, would it be a good idea? Thinking now, not directly, because those aliases are related to the main email address you have, so If someone would hack your email address he would get access to the aliases. So, in that case, would you recommend the use of aliases for having multiple email addresses? If not, for what would you use aliases?
As someone with a microscpic amount of online anonymity knowledge, but still practice things like temp mail, adblock extensions, not allowing location, etc, Ive always wondered less exactly if I could become more invisible online, and more how I can become invisible with my current existing profiles and circumstances. I can easily change passwords and browsers, but if I input my IRL data in Google or Apple for example, Im pretty sure there's nothing I can do to permanently clear my home address or gender. Also, Im not sure if I can switch all my accounts with separate emails, as right now all my recreational accounts have a single point of failure. Also, Im still kinda salty that I wasn't able to create more backup gmails when there was a free browser phone emulator that could be accessed with temporary emails. Hopefully I could find another workaround, but I don't even know if I can manage 10+ gmail accounts on a monthly basis.
Top hackers use millions of fake IP addresses to mask their real one so that anyone who tries to track them will have to work for days if not years to track them. That’s how you become fully anonymous 😎
Well yes but no. That one passcode can be very complex and difficult to memorize. Also there are date breaches a lot. If you only use 1 passcode for everything if one of the services is hacked your whole thing is at risk. Using a passcode manager is usually more secure and it means ONLY if the passcode manager is hacked your accounts are at risk. I don't suggest them if you want to be very secure but they are a good middle ground between security and convenience
Here is my other channel with nature related content: youtube.com/@halldenlogs3445
Hey, I got a quick question. Does it make sense to use both a VPN and Tor browser at the same time?
My issue with password managers is always - how secure are they? If they get busted, all of my passwords are, that's my thought process.
@XfxPro650W heard the same before. Is Mac better overall?
@@sumrandomguy4860 VPN is worthing 0 because if the VPN company gets served with a warrant, they will have to comply and give your own personal IP address.
youtube.com/@deadlyhacker991isback
He didn't only tell us how to be anonymous.
He also taught us the basics to be safe on the internet that most of the people don't know about.
HAIII BABUNIII YOU ARE RIGHT
@@abhisheksathe123 I just kept it Short Brother.
You should understand it. Overall tryna act cool is not good bro. I know what the title says. I ain't high. And I ain't telling something bad brother.
Thank you.
@@kenshin5727 Awww Honey bun amal babuni taa!! ALIGATOUUU!!
@thefallenshadow why you ask? Yeah obviously
@@abhisheksathe123 STFU
Now I can be as invisible on the internet as I was in high school
Lol
Lmao
Hahah nice
ouch, this cuts deep
Oh dude how I feel you on this
This video went from basic internet safety to getting away as a crime boss real quick...and I like it!
he forgot to mention the Tails OS and Prism laptops
@@satoshinakamoto7253 Tails is the GOAT one of those things where if you know, you know
Wait ! you forgeted tor and proxy server
@Mikey Yessir, a lot of them are usually with removable media but you are correct.
@Mikey Whonix is also a good option without flash drives
"I can remain unseen if I wish, but to disappear entirely: That is a rare gift." - Aragorn
or we can just die ⚰️
@@gnrlyj bro just 💀
🤣🤣🤣🤣
A couple of other ways: post letters; communicate with people by going to see them; shop by going to local stores; bank by going to the bank (if there are any left); grow what you can (salad stuff is easy and you can even grow it in an apartment); slow ourselves down, get off the click-shop, rebuild communities. Get on two wheels to move around: scooter for short distance, then pushbike, e-bike, motorbike. All good for the planet and us (careful on the motorbike). The internet has only been around for a tiny amount of time yet we now spend all our time on it (like me now). We could try getting out a bit more. Might be good for our mental health too as well as physical. For all internet uses though, do what Hallden says.
Plot twist: he is a government agent making it easier to track us
It is
duh
he didn't even like your comment like everyone else that made it to the top. you might be onto something.
You gotta go to China or Singapore or Hong Kong and wear mask, and you will just look like anyone on the street. No racism, just saying. I am Asian myself. When I wear Clark Kent Glasses, no one recognizes me and some mistake me with other person.
no he isn't ..but looks like you are ..now that's a good plot twist!~!
Wow, multiple book level knowledge condenced into a 24 min video. Absolute legend.
he forgot to mention the Tails OS and Prism laptops
@@satoshinakamoto7253 what are they? Please briefly explain
You’re spelling your name wrong in Japanese. You need a う after the りゅ if you want your name to say “Ryu”. Also note, using hiragana will make you look more like a preschool child or a teenage girl than an adult. But if you make it kanji, the Hayabusa part is already kind of cringey, so it will make it look even more cringe. I’m Japanese. You’re welcome.
wtf@@ABC-jq7ve
Extra added layer of security you can add to your passwords is to have your passwords in a foreign language, like Spanish or (romanized) Chinese. The further from your mother tongue and the less popular, the better. Good example is to find a band like The Hu that sings something like Mongolian, use a romanized version of a line from one of their songs, and then encrypt it.
I wonder what this guy’s password is..
that's a good idea sadly most sites allow only english.
@@what.anything Yeah, that's... that's why I said use a romanization of your specific language. I'd be shocked if a website allows you to use 咖啡因眼淚 as a password, but you can just use the pinyin for it, "kafei yin yanlei" and then encrypt it by changing like the K, and the N's to like a 7 and some #'s. Can do this with basically anything you want to just by going to Google translate (its inaccuracy being a benefit here) and writing down the Roman letters it puts for the pronunciation aid. It's super easy, though I would recommend putting it on a piece of paper just in case Google fixes a blunder it made that just so happens to Thanos snap your password out of existence.
I’m not sure I would trust this likeable but naive guy
You just exposed me 😅😢😢😢
Couple things not mentioned is to shut off your telemetry data inside your OS. Normally a stealth system requires this and should read "Your system has achieved a perfect "TruStealth" rating. Not a single packet - solicited or otherwise - was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice." You can also shut off netbios over tcpip in your adapter settings so you are not broadcasting, and hiding your ssid so you are not broadcasting your connections name through wifi discovery.
It is so important to police yourself online - never use your real name anywhere, never post a photo of yourself, never give out your exact location. If you use social media, again, use a "sounds like a real name", keep everything turned to Private.
Good method is to take the first name of a president and a last name of another.
@@strykertron232user barack trump would like to have a word with you
Really great and helpful video. Online anonymity has become more and more important for me over the last couple of months.
Thank you! Appreciate it!
@@kallehalldenassistant7578 lol
months try years
@@kallehalldenassistant7578 Scam call center 👀
It's crazy how much privacy people give up for convenience..
Not really i don’t care if business have my information they have millions of others also I’m not some dark web hacker so I don’t need that much privacy
Yeah bluntly speaking I don't care if someone knows my name/ where I live as long as they 1) obtained that information from me. 2) are not freely giving it out / selling it. 3) have it stored in a secure manner.
@@atroxiv but they are not safely stored and are selling it
@@kon6492 Most of them safely store it, I dont give it to those that have a history of breaches etc. And I also dont give sensitive information to companies that dont promise to not sell it.
he forgot to mention the Tails OS and Prism laptops
Been in IT since 1982 and in theory this is an excellent video and I commend Kalle for doing so especially unlike a good deal of IT RUclipsrs on here, who mainly want to show off, get attention and aim for sponsorship plus he does not hide it requires having the knowledge, effort and time to do so. Unfortunately as is with so many IT professionals I taught in my time, simply can't grasp that non IT people just want to 'use' IT to do what they want, as oppose spending additional time and effort in being able to do so. That is why even though we have so many utilities and techniques to make passwords more secure, people as I even do (and I used to teach security) now keep a small book with them all written down as we have to change them on an irregular basis. Just like a neighbour I once had, who never actually used his car (driving his wife mad) as he was always tinkering with it, in his garage, to make it run better. The other thing is that most users who wish to use all the aspects of the Internet now find to do so, have to abide by the rules, wishes and requirements that are for the benefit of the provider not the user. A classic example is how banks have totally reversed the relationship, where once customer was king to them now. Kalle's suggestions are valid but most major websites know this and have paid IT software and hardware developers to creat 'hoops' that we must jump through to use them which if you have sensibly carried out what Kalle has stated you 'AIN'T GETTING IN'.
There's another couple of aspects he doesn't cover. Tracking by apps, and cross-correlation of your information with other people. For instance, how many people have your phone number, and have entered it into their phone listings? And do they have utilities and apps that they use to make their lives easier and allow them to share their phonebooks with them? Or their contact lists for email? What about apps that you may have in common with your burner phone and your normal phone, despite not having them on in close proximity to one another? Oh yeah, there's also an algorithm that is used by intelligence services that correlate one phone turning off and another one turning on in close proxmity both spacially and temporally (time). And what about patterns in common? Do you have a group of sites you like to visit and are used on each phone/computer? Would your browsing history get scraped by malware? Do you pay bills online for utilities locally near you? Have you noticed that credit card transactions require phone numbers? And license plate readers and facial recognition, as well as gait tracing (the way you walk) can be used to identify you under a ubiquitous surveillance environment. Some interesting concepts covered in the show "Person of Interest" where the surveillance of everyone is a goal by intelligence agencies.
@@jum5238 how would you get around that?
@@justanotherhuman3668 here's what I've (hypothetically would) have done over the years to avoid those exact techniques @Ju M mentioned:
my phone had a pretty predictable pattern. At 10PM it would enter quiet mode and that silenced notifications and I'd typically put on a UFO doc to fall asleep to. So from the outside looking in, I was asleep.
I always used burner laptops/phones/hotspots to conduct business and swapped them out frequently. Laptop had Tails (no Windows/MacOS/etc). I never downloaded Tails from a machine or browser account linked to me and always used a fresh download on a new USB every time I swapped laptops. Some will say that is overkill. I would retort that person never took a 500-600 computer forensics course.
Business was always conducted during sleep mode and I left my smartphone at home and went to truck stops (Flying J, Loves, TA, etc). My burner never got turned on until I arrived. Obviously I was using TOR unless the latency was too much for what I was doing at the time was rare but did happen. I'd never stay longer than 2 hours even if I wasn't done. I'd go to the next truck stop if time ran out.
I went to well traveled truck stops, ones that were busy all night long. The more crowded the better. I had a coin and dodecahedron (D12) dice that I'd flip/roll to determine which of the 24 truck stops I frequented within 150 mi of my house I'd be going to. Heads was the number on the die, tails was 2x the number. I did that so no pattern could emerge and I never went inside to buy anything or go to the bathroom nor did I buy gas.
All the BTC I used came from Local Bitcoins (RIP). This was long before Monero. Before BTC, it was forums like Shadow Crew and trust lol.
Hypothetically.
?
Yip yap i aint readin allat
Am not gonna lie, i sat and watched this whole video and this guy spoken everything pertaining to becoming truly invisible online. He didn't miss anything out, this is literally the sauce explained yo👏🏼👏🏼👏🏼 well fu*king done❗️
It is tough to prevent data being tracked and hide info. Literally just whatever it may be related to the person (especially personal information) that is used for any purpose can blow one’s personal information and status. So far this is the best video I’ve seen and one of the many that is useful which I learned from.
Can you show us how to remove ourselves from all these websites that show your address, phone number etc...?
Impossible
unless your name is Harold Finch you will not be able to do it ;)
Don't give them that information
You have to do it one by one, it's not easy, but it's possible, i did it and i feel so free now !
You can issue a case if the website put your personal information without your permission
No one is safe online.. But good thing there are online angels like you. Thanks for sharing these tips 😊👍
he forgot to mention the Tails OS and Prism laptops
Nice upload, succinct yet easy to follow....
Highly recommended for anyone else with a short attention span or others who may have naively spent years feeling they have nothing to hide.... subsequently allowing many years of social-media voyeurism erode any belief in, or concerns for online privacy in 2022.
Much appreciated!
Liked the video.
The password creation system was good.
I was taught a system many many years ago.
Name Number symbol(s)
First step is choose four names. They can be a name of anyone you know preferably, the first names of Grandparents or Aunts or Uncles or long lived pets like cats or dogs.
The names must be at least 6 character's or longer each
Look at the four names and notice which letters are common between the four. Each name must have at least one character common to the two we will choose (for example the letter O or E)
If one of these names does not fulfill this rule then find another name. With all four names you have the first part done.
Second step - Pick four numbers you can remember They will represent the year and month that someone was born that is in your family network.
Look at the four numbers and notice which characters are common between the four numbers such that each number has at least one character (for example the number 3 or 2)
Third step - Choose two special characters. Pick ones that are in the same place with the most common types of keyboard that you will use. In this example we will have ? and > Avoid using things like full stops and commas as they are difficult to see
Next you need to establish a substituion rule for the characters so you can disguise the passwords.
For my example I will choose -
o and 3 and ? will be replaced by **
e and 2 and > will be replaced by ==
Always use two or three substitution characters together. Never just the one.
I now keep a small notepad with the four names and four numbers. But use the disguise substitiutions in those names and numbers when writing them down.
When a password is created it will always consist of the name first, followed by the number with the special character(s) at the end.
Now we will say that we have made up a password from my grandad's name and my fathers birthday with the special character ? from my choices
Fredrick0259?
On the website I will enter Fredrick0259?
To keep a record of this I would write
Fr==drick0==59**
Now, if anyone comes across Fr==drick0==59** in my house, work (or on my phone) they do not have the actual password.
You will need to create at least two passwords.
The first one is for social uses such as email and Facebook. The second one is for cash websites such as paypal or banking.
Once a year I change out the passwords. Although I have gone longer.
The names and numbers are writen in a small notepad. I also keep a copy of this in my phone.
The special characters are kept in my head
This notepad will also have the old passwords in case I forget to change out a password for a site after not having been their for years.
To create a new passsowrd I pick another name from the list and a number (they are chose at random). Then choose the special character(s) to end it.
The final trick with this system is that I can create shorcuts on my PC with the name editied to include the disguised password to act as a hint. The shortcut might be labelled as
My Gmail - Fr==drick0==59**
With these shortcuts copied to a memory stick I can have online access at any PC with the passwords easily to hand.
I have been using this system now for nearly 15 years. The same four names and numbers.
Once you get used to it there is no need to worry about remembering passwords current or way in the past.
To show how well this works - Using the example above. What is
Ge**rge0==64**==
It is worthwhile noting that this whole system can be reversed and still achieve the required list of passwords and maintain security.
You would now write the undisguised passwords in your notepad and on your shortcuts. The disguised passwords would now be used at the website.
Looks good but Fredrick and George can easily be deciphered . Guessing 1 number easy. Yeah, the question mark - they’re able to run info quickly. I think you were lucky you didn’t get hacked…. Right direction- just need more.
I recommend changing your email occasionally too, it's very easy with outlook/Gmail to add an alias email, make it primary, and delete your old one. So if your email has appeared in any data breaches, it's gone. But you still have access to everything with very little effort
10 year olds that feel like being a hacker would be awsome be watching this vid over and over. 😂
@@kallehalldenassistant7578 didnt ask dont care
Awsome
@@RohakGaming with that profile pic the only thing you do is ask and care for other peoples stuff
@@jurivjerdha2467 it was a bot who was promoting a fake scam link. Would you not say anything?
@@RohakGaming oh now that i reread who you @ and how his comment isn't available it makws sense. Thought you said "didnt ask dont care" to the first main comment .
I used to do my passwords like you describe. I had a handwritten list of 1/3-passwords for every site or service. Another 1/3 of the password was derived from the hostname or domain name of the site, and the last 1/3 of the password was a constant I had memorized. I had a mental algorithm for mixing them together.
Then I found a better way. I just had raw passwords written down for each site. I would then truncate its 256 bit hash down to size, and use that as a high entropy "random" alphanumeric password.
Then I discovered offline password manager. Their database is encrypted with a main password (which I handled as before). But each sites individual passwords contained therein were randomly generated ascii passwords. They also store TOTP keys to generate 2FA codes as an authenticator app. They also store direct url links so phishing becomes an impossibility; never sign in through any link other than the one you stored in the manager. You can also get creative and have an independent, memorized password (just a character or two) that you can prefix to the password stored in the manager. Ive even encrypted my entire password manager into a veracrypt volume.
Yes I use Bitwarden's pass generator, and implemented some weird systems for memorizing 128 character pw's. Just a part, then I combine both.
Also I use long complex pw's + biometrics.
Why don't you guys just post the password here too😂
I'll try the multiple email and longer password, thanks Kalle 🙂
Yeah highly recommend it!
@@Hallden_ thanks for the video, now i can commit war crimes
@@jumpergamer1913 go ahead comrade
he forgot to mention the Tails OS and Prism laptops
2:50 3:15 4:09 can remember 4:55 6:30 7:40 pw manager 9:10 stop giving out details 10:15 create multiple emails 13:05 TOR 14:45 tor 15:30 Signal 17:10 u trackers 18:38 proxy 21:00 surveillance 21:30 burner 22:00 gmail 22:25 never search
I needed the part three of your video .
Thank you soooo much
In addition use a satellite dish to connect to (public wifi) proxy 🤝
Using the plus symbol + for concatenation in email addresses IS actually formally part of the standards, making it easy to create one purpose email addresses. But major ISPs like Goggle will reject these. Goggle also ignores using a period . as a separator despite that also being a required standard.
what are you talking about?
first of all, Google is not and never was an ISP, second, they absolutely do allow you to use the + character in gmail, so idk what are you talking about
@@wojtekpolska1013 he said Goggle not google bruh 🥶💀 when blindness intensifies 💀💀💀💀
This Is The Man I Have Been Searching To Mentor Me.
Hail Kalle Hallden🙌🏼🖤
he forgot to mention the Tails OS and Prism laptops
@@satoshinakamoto7253 Shut up
I use hash encrypted passwords. For example I want to use "the final countdown" as password, then I encode it with sha512 or sha256. Then get a long hash and I use it as password. Only I know the "real password", which I am easily able to remember and to encode with sha512/256 to the password I use on web.
Cool video! 👍🏻
That means that your password is "real password" + "fake password" + your encryption algorithm. Not bad, because some hacker would need to put 3 unrelated info together to break the security.
@@dhay3982 *WE DO NOTHING !!! THE PC DO 99% OF "DECHIPER"*
*EVERY PASSWORD IS A JOKE*
*EVERY PIN IS A JOKE*
*THERE IS **#NONE** SAFE THING ON A "COMPUTER" ...OK*
*THE POINT IS ....*
*DO NOT WRITE "ANYTHING" ON "COMPUTER*
*...... WHO CAN GET YOU SELF KILLED .......*
or
*...... CAN GET YOU #30 YEARS IN **#JAIL** ....*
*(NEVER ..OK !!)*
*THIS IS THE "ONLY" 2 THINGs TO **#REMEMBER** !! FOR LIFE*
AND I KNOW A "LITTLE" ... ABOUT #IT
.... oooh WHAT is .....this .!!..
(clash of clans)
(club penguin)
(no end)
HAVE A GOOD DAY ... YOU
Extremely complicated passwords need to have more time to decipher, nevertheless the hacking never stops.
@@netautorisationnetautorisa545 **CAN you EXPLAIN me why you WROTE** it like that? And why did you **put** random names in **THE end**
The better advice would be use strong passwords + MFA, and you're almost impossible to hack if you use your brain a bit.
Best of both worlds. Invisible in society and now on the web
I used a password system where you think of a word and just add the date of that day in front and the state you're in(as in drunk, happy, sober, etc). This worked for me so far
really great video as always! I love how you trigger the interest with some general interesting thumbnail and proceed to explain it in detail in the video. Keep up the good work man! Love from Italy
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,...... ,,,,,
he forgot to mention the Tails OS and Prism laptops
To create your own proxy you can rent a VPS server somewhere in the cloud and all your internet traffic will appear as if it came from that VPS server.
yeah, but how will you pay for that? 99% of online banking require passports these days
The video is great!
Just want to add that you can create Gmail accounts without phone number. On signup on a new (or after factory reset) Android device, while setting up, you can create a gmail ID without giving a phone number.
Also temporary disposable email accounts can be of great help where you only need to create account and use only once
One of the biggest problems for remaining private is Hardware,Software,Program,File,Data Fingerprinting. Giving misinformation is the best way but it's getting harder to do, if you have not already done this like 12 years ago then it's to late now. If your face is not on line now then put it on line, after you have tweaked you picture so it still looks like you but AI cannot match it to you. You need to put out your misinformation as soon as possible so it's accepted as you, then when it securely given without you consent to others it's then accepted as you and gets imbedded as you in the system. Then until your misinformation is 100% removed from the systems so it cannot be auto replaced by any system you are a lot safer.
It's way better to hide in the crowd than hide on your own, It's only secrete if no one else knows.
You try to hide, they try to find, like a snake bites it's tail
"how to completely disappear a drop of water? Dropping it into the Ocean"
i mean the last level could be used against some creeps from like darkweb or someone you made mad. For example if you knife someone in csgo he wont be able to trace your home
not csgo lol
When you type "gg, close" when you destroyed them 16-0
you should definitely make a video on setting up a proxy by ourselves at public wi-fi's..like starbuck,stations,etc...
@@kallehalldenassistant7578 Lmao you seriously try to lure people into scam using channel that is about tech? (I mean, u probably won't answer cus it's bot but still lmao)
@@micropanda7916 ?
@@micropanda7916 just because someone doesn't have any videos doesn't make them a bot...
@@happystarthe3rd hm not really u can just duel boot kali or whatever os u want. its what I do
@@warzone2620 Yeah but for people new to this stuff is probably scarier and they feel safer using a virtual machine
Becoming anonymous is really, really hard. All that things you said works only if you're trying to avoid corporate companies. YES corporate companies. They will have a hard time figuring who you are and making your profile stronger. But government and sometimes other companies will track you down anyways. It might be the way you type or other patterns you follow. And avoiding cameras are also very much impossible. Remember you walk in a certain way. You have favorite coffee or drinks. It's not hard to track you down.
This was about digital invisibility. Not literal social invisibility. There’s a video on _that_ topic made by a former CIA agent and it showed just how much more difficult it is to absolutely vanish altogether. Most of it had to do with eschewing the digital environment completely, going cash-only, and mostly being a complete loner.
nah just buy a whole outfit with cash through people you know, walk with rocks in your shoes into a starbucks with the anonymous clothes + mask and hide the raspberry pi, after that just stay on a VM or RDP with your proxy/vpn (preferrably mullvad vpn) when commiting crimes, and try to stay on TOR as much as possible. also change your cybercrime persona around every year or two and get completely new proxies. if you manage to do this without doing anything dumb like posting pictures anywhere you'd be very near impossible to track through governments. the only way to get you would be through opsec fails or through investigation of where your money comes from, but even if they raid you make sure to have your whole PC encrypted through veracrypt.
remember all this is a bit overkill if you arent making over 1m/year or more through cybercrime, if your making less then that feds wont really care unless you really make a name for yourself in the time you spend building your personas or if you threaten national security.
so nah tracking you down through the internet would be pretty hard for the government if you try hard enough
@@OneBiasedOpinionsend link to me
I like your layered approach to online opsec.
I found this channel and this video from the main page of RUclips on the safari version on my iPad Pro! Nice video!
Let's be real if you clicked this video you need to apply these skills immediately, cuz your getting put on a list after clicking this video
lol its a joke but its also not a joke. I've been coming across so many other serious issues that have that same affect.
My fault you didn't even say it was a joke - I guess its just the idea that many people will read your comment and assume it is a joke
Yamete kudasai FBI agent~kun
Analogies are on an another level 🔥
8:39 If you don't trust a password manager you could just use a password protected encrypted folder. A lot easier then building your own password manager. Only problem is virtual memory could cache the data in plain text on the hard drive.
win10privacy has a option where it clears out the virtual memory sheet everytime it boots down
Another way to save your password is saving it inside of an image on another device, this allows you to use a very complex password. While being pretty safe to use.
Steganography?
Stealth Phones are also an Option. You can buy them from some trusted companies, and this is the most important step. They change your IMEI, connect to the furthest cell tower possible, making it impossible to triangulate you, they do not have any hardware IDs and do have encryption features. However you're essentially paying 600bucks for a tuned Nokia, which is safe
Edit: It also doesn't offer internet access, updates or anything of that sort
I have never seen such a professional and transparent video in my life
Strong password is like sheldon creating long password for pennny. 😂
As you have mentioned the trade-offs of enhancing security at the expense of user experience is what will keep people away from these practices. I find myself in that group of people because I want a good time and I have nothing to hide. Anyways, I do use a password manager (because it’s just easier) and a vpn (to get content from the other side of the world). Thank you for the suggestion about multiple emails I could use it for separation of concerns purposes
I REALLY LOVE this video, explains everything I’ve really wanted to know and extra I didn’t even think about
Could you make a video about erasing your online identity? Like the process and steps it would take to delete as much info about yourself that on the web available so its easier to become invisible without much worries
This went from 0 to 100 real quick 😂
Like from tips to be secure on the net to outright being a cyber criminal. Like tips on how hide your face and stuff lmao
Hide your face, steal bandwidth and power from the local starbucks et al.
he forgot to mention the Tails OS and Prism laptops
You could also use a VM and reset it (to a certain state) every time you're done using it
what is a vm?
@@Sebasivx virtual machine
or use a virtual machine and sock5 in addition
A vm by itself is no different than using your own machine though. It’s pointless.
@@TengwarTeacher it isn't. With a VM and you restore it to an earlier point, you ensure that no program stores anything on your machine
I see you're experimenting with longer form content...I'm not complaining though😂
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}......
Cool lil thing for emails, you can sign in with all your emails on mobile (up to like 10), and search all inboxes when looking for something.
Finally a video that even I, a non-IT-expert, could understand.
Plot twist: Kalle isn’t Kalle
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}......
Kalle Linux
To be invisible on the internet is impossible because you always have clues to know who you are, not even Tor can make anything to you, you can only disguise your identity
Every time I watch your videos, don't know why I feel next video will be music production video😅 such a versatile guy
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}.......,,,,,,
You: I'm gonna teach you how to be invisible.
Me:
The problem with tor is it's extremely slow
Here we go!
First!
2nd
Third!
Fourth!
Fifth
Why was Bitwarden not mentioned? Also just use the security questions fields for other passwords and save them somewhere else instead of answering them.
+1 for Bitwarden
This video was full of flaws
Putting a RPI in a random starbucks to protect your self from something that is false? What TF thats the whole reason of having 3 nodes on tor
And nodes are still just proxies
@@JohnSmith-gd2ws That's exactly what I thought too
he forgot to mention the Tails OS and Prism laptops
You mentioned keepass!❤️
Subscribed..
It's so funny. Digital is now so cumbersome I need to go back to my paper notebook to store all my data. Thank you digital revolution!
Here’s a hard question for you, if a company can provide end to end encryption for your IP address and packages.. how hard is it for one to just do it themselves?.. and would you consider making a video at least explaining the complexity of doing so?
Thank you and bye ✌️
he forgot to mention the Tails OS and Prism laptops
yeah loads have these companies have extremely sensitive data and ever since working from home we all have vpns so there must be a simple way to just browse and do everything privately... however I guess when we use company laptops then we're less likely to do anything else other than work related activities on the laptop and so less likely to get hacked
When I make really long random passwords I just memorize the rythm of movement that I make when I'm typing the password out. I don't know half of my actual passwords but I know the hand movements for them :)
The problem is if you don't access that site regularly then you can't have muscle memory for that site, so you may forget the password of a site that you haven't accessed for years.
@@LakadMatatag2702you'd be surprised... I've recently logged into an account that I hadn't touched in two years and I typed the password as if I had been doing it every day. Muscle memory lasts a long time 😌
good for you, not everyone is that kind of mutant. I work construction and go hiking in my free time. I don't have time for all that craziness.
@@darkenedvision4709 hahaha 🤣👌🏻
The longer videos are amazing! you’re such a good editor and great speaker
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}........,,,,,,,....
he forgot to mention the Tails OS and Prism laptops
@@satoshinakamoto7253 Nobody asked
I thank U so much for this information & with that I'm pretty much a beginner to the information.but i'm really determined to give it a GO! Thank you for your time & information. Mr. Hop....
I didn't watch the video but here are my tips:
- Have multiple emails,
- Redirect some of your request to TOR/proxychains with dnscrypt(most of TORs proxies does not encrypt the DNS so you can find someone just like in paper chase game)
The 9 people who disliked are the hackers who want to see everything you do on the internet.
No those are the people who are pulling their hair out from him recommending paid cloud based closed source password managers after he scared people with the idea of remembering hard passwords instead of jumping to the subject of self hosted or offline open source pass managers such as bitwarden or keepass.
Or him telling that the exit node on tor can see you and you need a proxy. No they can't that's the reason why you are routed thru 3 random computers ran by ordonery people from home. Those are also proxies and they are not hiden in a random starbucks (What TF) Trafic is deencrypted and reencrypted on each node. Nodes owned by the same person are not allowed to connect to each other and get black listed if they do. Also evil exit nodes are non existent and even if they dont get insta banned before verified they wont be able to do anything anyways
But that no concern anymore seeing dislikes since youtube is a crybaby over rewind and hated goverments and companies are also angry over seeing crap ton of dislikes
he forgot to mention the Tails OS and Prism laptops
@@satoshinakamoto7253 You forgot to shut up and stop copy pasting the same comment everywhere.
I would just add being aware of threats and always looking for them. Obviously phishing attacks are very popular atm. We done a phishing test on our workplace and far too many people clicked the links.
Great video as always! I'd like to add to the email part in that Simplemail can be used to create email aliases, which essentially allows you to create "new" emails that people can send mail to, but it will get forwarded to your actual email address, thus allowing you to in reality still only manage one email.
Gmail has this built in as well I believe.
No, Microsoft (outlook) has.
Firefox has Firefox Relay now, user created "burner" email aliases that forward to an actual email address. You can one-time use aliases as and when required or keep some standard ones e.g. one for shopping, one for extortion, two for porn, etc. ;-)
So, google (and possibly others) have an AI that is used to analyze ones text to reveal identity, which they use to connect activity across the internet. There are two layers to this. One is the scanning of your typed text for similar word usage, grammar, spelling, vocabulary, sentence and paragraph structure. The other is a real-time live scan of your active typing (you already know google does real time search query feedback), which they test for things like cadence, typing speed, your typing errors (even if you correct them), and any patterns among these, generally your typing and writing style before you even hid the submit button.
You can circumvent the second technology by pre-typing your text in notepad before copy-pasting it into the web. There isnt much you can do about the first technology though, outside of going out of your way to sound unlike yourself.
I'm impressed that the US haven't tried to remove this video from RUclips
Snowden: *takes notes
One day i will be an outstanding programmer and i love your videos. A big fan of your videos.😍
Thank you I really appreciate it! And you will for sure
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,.....,,,,,
I like how he refers to the pandemic as the “thing that’s going on.”
I used KeePass for a long time, then Dashlane and then I finally migrated to Linux, made an RSA key pair and stored all passwords with GnuPG. There is a useful "pass" script working on top of GPG. The passwords are simple binary files (encrypted) and can be easily transfered between machines or synced with Git. Of course, it's better not to show your files - then a LUKS-encrypted file system on your OS drive and thumb drives comes in handy. There is also a great password generator utilities like "apg" and "xkcdpass" that can make rememberable passwords for you that are strong against dictionary attacks.
If you are really paranoid, there are privacy-oriented distributions like Tails.
I came in here thinking this video was going to be like: "You can't. Thanks for watching.", but then I realized it is 24+ minutes long.
At point 17.01 you missed a golden opportunity for all the Tolkien fans. I was SO sure a few times you will say it: "but to disappear entirely, that is a rare gift".
Very instructive video by the way. I especially liked the part about replacing a letter with a group of special characters. Very simple and useful.
I've had a crap week, but you saying "visable" is just making me smile, this is why I love your content !
Kalle using laptop with Intel Management engine telling us something about invisibility
Still great video
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,.......,,,,,
also talking about anonymity while using cloud service and mobile phone
Had me sold just from the opening
All of the UK are watching this now! Level 3 for UK!!!!
Everyone have already been connected on their private network that are registered in their name. It's already too late to become invissible for them.
Amazing video, very well put together. Keep it up :)
looks like this will help me a lot! THANKS, Kalle!
I upvoted because you mentioned the final countdown
I have an alternative to the last step of complete invisibility, you can combine VPN service with Virtual Machine, on a VM you can set up everything which could be used to track you, so that way you become completely invisible
Unsurprisingly it ends up like Kevin Mitnick's: The Art of Invisibility. Well done! Hope to see more of this well presented content.
Major premise is incorrect for why you should do this. It is NOT the individual that is doing something illegal. It is a government/ state/ bad actor, etc that is engaging in illegal activity. This is why most individuals do need to do this. Think of communist/totalitarian states of old and the new ones rapidly emerging.
You said something and nothing at the same time
@@iidotz5351 BWAHAHAHA, Indeed.....stealing this, hope you don't mind!
It is NOT until he even gets to the described "3rd level of anonymity" that anything you just said could be loosely applied. If you have a burner cell, and or laptop, avoid family and friends as to not get filmed, so on....you prolly doin sumthin, lol.....allegedly
Me trying to be visible and get hired by someone
remember friends if you get caught - Better call Saul
Having offensive slurs in your password might help
My password is literally lilnigga420
I feel like if you can't afford a respberry pi you could just go to Starbucks
It's a thing people tend to so actually like the creator of silkroad
Hi. I have a question when it comes to having multiple email addresses. Is it acceptable to have multiple aliases as email addresses? For example, Protonmail has this feature (in the paid version) where you can create multiple aliases which would act like having multiple email addresses. The question is, would it be a good idea? Thinking now, not directly, because those aliases are related to the main email address you have, so If someone would hack your email address he would get access to the aliases. So, in that case, would you recommend the use of aliases for having multiple email addresses? If not, for what would you use aliases?
As someone with a microscpic amount of online anonymity knowledge, but still practice things like temp mail, adblock extensions, not allowing location, etc, Ive always wondered less exactly if I could become more invisible online, and more how I can become invisible with my current existing profiles and circumstances. I can easily change passwords and browsers, but if I input my IRL data in Google or Apple for example, Im pretty sure there's nothing I can do to permanently clear my home address or gender. Also, Im not sure if I can switch all my accounts with separate emails, as right now all my recreational accounts have a single point of failure.
Also, Im still kinda salty that I wasn't able to create more backup gmails when there was a free browser phone emulator that could be accessed with temporary emails. Hopefully I could find another workaround, but I don't even know if I can manage 10+ gmail accounts on a monthly basis.
Top hackers use millions of fake IP addresses to mask their real one so that anyone who tries to track them will have to work for days if not years to track them. That’s how you become fully anonymous 😎
Proton mail
@@mattdouplesx ProtonMail logs your IP
Whats the keyboard you use 👀
It looks very nice!
Dude, THANK YOU. What a great video. This should be mandatory viewing and taught in schools.
this is not such great of a deal that it needs to be taught in school, but rather 'safety in online' should be
@@beforedrrdprthen go teach ppl
@@nyudoragon1478 i am clearly not expert in that field
7:50 doesnt this give you one password, for managing all your passwords, essentially the same as using the same password for everything?
Well yes but no. That one passcode can be very complex and difficult to memorize. Also there are date breaches a lot. If you only use 1 passcode for everything if one of the services is hacked your whole thing is at risk. Using a passcode manager is usually more secure and it means ONLY if the passcode manager is hacked your accounts are at risk. I don't suggest them if you want to be very secure but they are a good middle ground between security and convenience