Our privacy has been gone for quite a long time. My grandfather was a bootlegger and they used carrier pigeons or in person communications back in the day, we may have to to go back to those similar technologies.
TLS is broken and quantum computers will soon decrypt traditional security tools. Sophisticated hackers and nation-states are looking to log your traffic right now. How? By exploiting the known vulnerabilities of TLS. They'll store that traffic until quantum computers allow them to decrypt your information which is right around the corner this year@!
I was thinking that, but the more I realize it's not any different than what we did 15-20 years ago. We have to think of how we did things back then and from there think about what's available. It seems that once those habbits are there it shouldn't be too bad.
Once you understand how privacy in the digital world works, you know what to do and what not to do. It's really not as hard as it might seem to be. There are a few rules that you need to go by and apply to what you do on the internet (or anywhere else for that matter). Most people give up not because it's that hard, but because they were conditioned to be lazy and were falsely told that if they are not criminals then they don't need privacy (which is not true of course).
@@annihilator9075 If you're thinking of Lavabit, that company was built on a fundamentally weak security architecture that had a single point of failure: there was only one encryption key, which was used to secure every user's e-mails. When the U.S. government demanded access to said key, it would've compromised the security of every Lavabit user, not just the ones being targeted by the govt.'s investigation. Most other encrypted e-mail services use a different set of keys for each user, thus eliminating that single point of failure.
If services such as protonmail become widespread, then, they're no longer "you've got something to hide" email. They're "email everyone uses, because privacy is just common sense."
7 dislikes? I guess there are 7 individuals that apparently don't like "Knowledge". Amazing. Thank you Rob for educating us on these privacy concerns.👍
1:14 start: Gmail 🤣 2:21 old protocols 3:14 email server 3:50 encryption and metadata 5:15 MTA and SMTP 6:15 Snowden 7:18 STARTTLS 9:04 #1 Hide your IP address 9:55 #2 Segregate your email 11:08 #3 Limited use of real name email 11:59 #4 Don’t use Job email for personale use 12:45 #5 State Players 13:23 #6 Set up your own email server 14:18 #7 Use alternatives to email 15:24 #8 Download email and POP3 16:28 #9 No contact list 17:46 #10 No phone number for 2Fa 18:47 #11 19:18 #12 Dont trust Encrypted services 20:51 #13 Gmail for throw away email only
Dear Mr Braxman, Thank you so much for your 15 e-mail tips, they were really good, but however people like us can forget some of them. So please put these tips in writing so we can download them and refer to them for our remembrance. Thank you and all the best for all your future videos. ...... Sunny.
I know he doesn’t like to talk about politics specifically, but I’ve been thinking about getting in touch with him on Brax.me about mentioning this. One of his previous videos not to long ago talked about a UK company doing all this research on what people are looking at on the web, mostly with a ‘far-right’ slant, and Canada was in there. We are the only western nation considering a China-style Great Wall of internet censorship. Bill C-10 if passed is the beginning of the end…
What email should we use for shopping--as it will always reveal our shipping address, partial payment details, and most if not all of our real names? What's the best way to limit this information via email?
Rob you bring a very rational and down to earth explanations to a very complex subject. Thanks for this. How would you reverse years of being integrated into gmail and other "free" platforms with all this new knowledge?
Thanks for the video !!! It was great !! It would be great to show us how you do to make our own email server and most secure and anonymous :)) Keep up the good work !!!
Hey Rob just thought I would mention that after finding by accident that Aol had taken a voice print of ME with out consent I sent a letter asking for an explanation,,,They replied they had sent my request up to another office and would get back to me....This is not the first time a company has done this to me and never have they been able to provide me with a law or statute that allows them to legally do such a thing,,,,,,,,,Take Care,,,,,,,,Douglas
well, in the case of using the phone as 2FA then we have no other option but to use it, we have to use a different line per site to avoid the matching. what other 2FA can be used to avoid this other than phone, with Google services I think we have no other option.
So what's the advice if you actually DID use part of your name for your email address? I understand why not to use it, but these email accounts are 15+ years old...not so easy to just stop and switch...anyone gone through the laborious process of switching over to a more securely-named email address? Thanks for the video and information!
@@robbraxmantech Thanks! Sorry, I got a bit anxious with posting a question...posted after only watching half of the video 🤭... I'll finish watching though 🙂
If only we would stop thinking "free = free" and realize that it is always a trade, albeit a hidden one, we'd be much slower to grab whatever is free and sometimes, just cheaper. Would you be willing to pay for an email account, monthly? You see, servers, software, maintenance and data cost money, that has got to be covered somehow. No email is "free", there is no such thing as "free space", somebody HAS TO pay for it. And it's you, and the way you pay is buried in and derived from 1500 page long Terms and Conditions that no user in the entire history of computers has ever read. Now sometimes, this can be pretty innocent, just a ton of ads, that's how it started. Now give that situation 30 years and a million of brainstorm sessions all around the globe by money-hungry companies and career hungry individuals and try to begin to understand they have by now exploited every smallest nook and cranny that is not very clearly illegal. And we can not grasp it, because it's too complex and we're busy... living.
I've been using my own personal name domain name for years (>20), but limited to specific use as mentioned (gov't, bank, family, places with full name already), but I use gmail for generic and never associated name, but now I'm wondering about either. My personal domain has been getting much more spam lately, which it never did, so there is a leak somewhere). I was questioning Google Voice, but now two people have said it's okay. Like my credit card, I wish I could generate virtual/temp phone numbers. Interesting mention of Google Gmail, I've always kept it generic/hidden, but places want it for password, so your mention of stores was good, essentially anything that can triangulate with other info. When will profile photos be a concern? I suspect facial recognition and database linking is already occurring.
In many states, voter registration forms, mailed ballots, motor vehicle departments and state web contact forms all ask for your email contact address. And they sell it, along with all of your information.
Rob, can you update this... and do a comparison of the meail providers? Proton Mail claims to have > 100 MILLION users now so I'm not sure it is an automatic flag like it was years ago.
my domain provider got hacked, i know coz i started getting spam calls trying to sell me webdesign services for my domain which is supposed to have records protection.
I purged all my emails and put them in folders if I needed them. So last few days I removed about 2000 old emails. I am already getting less spam emails. That is my biggest concern. Junk mail! Even if you unsubscribe it doesnt stop so sending them to spam. Does putting them in folders and off the in ox keep them private?
If using an encrypted service yourself how can you protect mail that is sent to a service that doesn’t use encryption? That has to be the most likely scenario right now,. I can see Amazon, eBay or a mom & pop store moving over to end to end encrypted for us. Is it just keep the email and IP as anonymous as you can?
A VPN helps, but cannot always be working. Using the mail client Thunderbird helps, because it prevents auto-arrival of email when the VPN isn't active...unlike other mail clients. Unfortunately, there's no Thunderbird for phones. So I do not link email to any phone and reserve it for only use with a computer.
You use Google voice for two-factor authentication? Wouldn't using a Google based product or service expose a person to additional surveillance? I mean, if they track and record everything that we do, then that would link a person to an additional service or otherwise.
How do I start from scratch? This is what I'm thinking: 1. get a degoogled phone 2. new linux computer 3. all new emails, following tips from this video 4. all new logins with fake info 5. new phone number 6. Use all the old stuff from above but only for disinformation 7. I need to copy and paste posts to avoid linking me by key stroke trackers 8. Router VPN and TOR browser or brave What did I miss?
Your actions depend on your "threat model." Watch OPSEC subject titles on this channel to plan your escape to more privacy - you've got a GREAT START with a comprehensive list! You're missing "browser isolation," the most simple and free thing to do for starters. Plus, get off Facebook and all Facebook-owned apps. Be sure NOT to download TOR browser until you have a working VPN, you'll get on a "list."
I have several domain names with email server service. You say if we are a group that wants privacy and security we can use this if we communicate within the domane? You say this could be safe? For ex unconfortuble journalists that might get some attention from the state. I also remember you having a free email solution?
I understand where some people may want to hide their political views shared in emails, perhaps for business purposes. That may be appropriate and is a matter of personal choice. However, we should never have to fear retribution from government for our speech. Consider the price we pay when we begin to censor ourselves.
yes, great point. Unfortunately, corruption doesn't need ethics - it only needs opportunity. This channel points out how the technical opportunities exist, so they are GOING to be used. Gradually is there *is* now retribution and effects from holding certain "opinions" - and it's only a matter of time until "profiling" and categorization WILL be used against people - in fact, this is already happening...and it's frightening!
@@mistyculous9644 Hello, Yes, I have already seen the video you sent me its link (and it is interesting), but I am wondering if it is possible to make any "Virtual Machine" on android or a 2nd user account with limited authority on Android, the same a Windows? At least to defeat the phone from viruses and malware by having, for example, a user with limited account authority or a VM on the phone.
I used Gmail, creating a new anonymous address, for correspondence concerning a ticket court proceeding. Google, at one point, refused to acknowledge my legitimate password, and I lost access.
whoa... That happened to me. Almost lost a blog I'd been adding to for over ten years. It was only solved by giving them an old burner phone number that I happened to have laying around.
@@mistyculous9644 Good deal. I don't give Google my phone number. They know it is my email, I gave them the correct password. They claimed it was wrong.
BECAUSE CORRUPT GOOGLE WANT U TO GIVE THEM UR INFORMATION WHICH IS NOT RIGHT BECAUSE AFTER U GIVE GOOGLE UR REAL EVERYTHING YOU HAVE NO PRIVACY AFTER THAT.. DID GOOGLE ZACKY ZACKY BURG GAVE US HIS PRIVACY INFORMATION TO US THE CUSTOMERS..NO. BECAUSE HE WOULD GET CURSED OUT TO HIS FACE HOW CORRUPT HE IS WITH OUR INFORMATION THAT HE IS USING FOR FREE. 😄😄😄😄😄 SEE WHAT GOOGLE CEO'S IS DOING TO HUMAN BEINGS.
@@gumby-galbraith641 I am considering going to court and filing a subpoena. My name is all over the court proceedings. I even gave them a valid password. They try to compel you to link it to other accounts.
What does it mean "to have your own server". Do i have to have it in my home, phisically, or is it ok to buy some VPS server and set up my server remotly? In switzerland or some island, or on Africa for example :)
Rob endorses using "linnode" servers, which don't exist in your home. Rob has said in other videos that it's best to not have your own server located in your home, actually.
How about writing the e-mail on an offline computer, then archive it with 7z and password-protect the archive, then send it using Thubderbird in Linux? Will that do?
Hello Rob ! ...how about if you attach a pdf file to your email...a file that requires a password to open it ? can that also be read from anyone on the way ...? my lawyer does it and say its safer ...but listening to your video here I am not sure anymore.???
Hi Peter - that is a great idea! I cannot answer your Q in relation to 3-letter agencies, but it seems like a perfect solution for general privacy. For instance at work, and an old buddy wants the low-down on your company as he is thinking of applying for a job; or communicating with a lawyer or friends whilst you are going through a bad divorce and you do not want a plain-language record flying about ther internet.
So, segregating your emails is good advice, and I do this to a certain extent. However, since most of us haven't been using VPN, and most of us access the various email accounts from the same device and IP address, and the government has access to and stores all that data, then can't the government figure that out that all your email accounts are probably the same person?
yes, depending on how the app is designed. That's why you should always read the reviews before you install the app where people complain about the app doing this.
I have several G mail email accounts, including a gmail for junk, (store coupons and other stuff like that), which I also use for my main RUclips account creds and which doesn’t have my name on it, apart from where I registered years ago; another gmail account for business, and some spares. My main email account is my old Mac mail, still @mac.com . I’ve been very interested and quite annoyed to find my Mac mail marks my daily Epoch news as junk mail almost every day, and I have to mark them as not junk. It doesn’t do that with much else including junk which I often have to mark as junk. Once a I have marked it as not junk it should stop marking as junk, but it doesn’t. I’m just starting to watch this video as a I write and I’ll be interested to see if and how my mail is filtered by Apple down to my politics!
After a few paychecks, I'm just getting a new phone. Let the youtube account just live and age in the ethersphere. Stored in a tiny little corner of a server rack. For some future child legend to stumble upon and spark a world Renaissance.
Dear Rob, Ting has been bought out, your plan that you are on , is NO longer available. $6.00 per device no longer exist, unless you had a previous contract.
Not really. You will stick out because of the user agent among other things. Use the tor browser if you really want to be anonymous. But it still is better than nothing.
in case you question the opinion of the person above me, i was a long-term tor user a few years ago and they're 100% correct. user agent narrows down a lot. plenty of sites can also do certain things to tell you're using private browsing. ideally if you're going to use tor at all you're also not using windows. it's still better than nothing, but it's not particularly good or safe. remember, the only thing worse than no security is a false sense of security.
@@macster1457 Possibly, depending on your use case. Depends on your email service, your threat model, what type of content you're sending, etc. If you just want basic privacy from your ISP for an anonymous/burner email for example, that would be fine. If you're trying to send very sensitive info from an email that's directly attached to your name, then it wouldn't make sense.
9:05 the 15 tips start here ✅
Thanks.
Our privacy has been gone for quite a long time. My grandfather was a bootlegger and they used carrier pigeons or in person communications back in the day, we may have to to go back to those similar technologies.
TLS is broken and quantum computers will soon decrypt traditional security tools. Sophisticated hackers and nation-states are looking to log your traffic right now.
How? By exploiting the known vulnerabilities of TLS. They'll store that traffic until quantum computers allow them to decrypt your information which is right around the corner this year@!
Ever hear of IPOAC? (IP Over Avian Carriers: a method of transmitting internet data via carrier pigeons.)
Wow, great story! Best wishes from the UK 🇬🇧🇺🇸
TRUE BUT TRY ON DO BETTER FOR 2022
@@InventorZahran true Amish-level encryption detected 😆
You create the most important videos on RUclips. So very thankful!!!
That's not an understatement. Big tech being controlled by authoritarian ideologues is one the biggest existential threats to mankind's future.
Greatful for you! 👍🏼🍃💪🏼
O9@@wereproductsnotconsumers8179
he and the hated one
AWESOME INFORMATION!!!!
Just saw your interview on the Corbett Report and it was awesome!!!
It truly was.
In summary, guarding your privacy on the internet is a full time job!
🌟
I was thinking that, but the more I realize it's not any different than what we did 15-20 years ago. We have to think of how we did things back then and from there think about what's available. It seems that once those habbits are there it shouldn't be too bad.
Once you understand how privacy in the digital world works, you know what to do and what not to do. It's really not as hard as it might seem to be. There are a few rules that you need to go by and apply to what you do on the internet (or anywhere else for that matter). Most people give up not because it's that hard, but because they were conditioned to be lazy and were falsely told that if they are not criminals then they don't need privacy (which is not true of course).
@@Dastardly_X yes
Actually, CB radio provides better privacy
Privacy needs too much discipline and care. No one except 0.0001 % will do this. We are screwed!
I remember some people made it easier by forming a company, but the US government harrased them and shut it down.
@@annihilator9075 If you're thinking of Lavabit, that company was built on a fundamentally weak security architecture that had a single point of failure: there was only one encryption key, which was used to secure every user's e-mails. When the U.S. government demanded access to said key, it would've compromised the security of every Lavabit user, not just the ones being targeted by the govt.'s investigation. Most other encrypted e-mail services use a different set of keys for each user, thus eliminating that single point of failure.
@@annihilator9075 government = cartel
I respect this man so much.
He is doing a great service, I am amazed his videos don't get more views.
TRUE THAT
@@Jeff-lu9wi so as volunteer we should help him. Which email do you use
@@Jeff-lu9wi so as volunteer we should help him. Which email do you use
me too
No other person will tell all all about privacy like Mr. Braxmann.
Thankmyou for this.
If services such as protonmail become widespread, then, they're no longer "you've got something to hide" email. They're "email everyone uses, because privacy is just common sense."
Proton is not safe. They store IP, subject matter is not encrypted (pgp).
Thank you, thank you, this is so overwhelming for me. I would really need to set myself up all over again from scratch.
I watched this on Y.T. And hit the like button. Dang it! LOL! You’re the best, Rob!
Working from your Yacht again I see. 😁 Thank you for the informative video about email 👍Ive wanted to hear something about this for sometime !
Smart to do this videos on your boat... use it as a business write-off since it is your studio/office.
7 dislikes? I guess there are 7 individuals that apparently don't like "Knowledge". Amazing.
Thank you Rob for educating us on these privacy concerns.👍
yes, this is a "high content" channel and that's daunting to a causal viewer who wants to be "entertained" and not do anything about what they learn.
They were Google, Facebook and 5 government agencies.
I saw you on the Corbett Report on Odysee, you were great!
can you give us the link?
I didn't know they knew each other. Mind blown
@@darksoulsong I tried - but hotlinking is disabled in these comments - visible only to me.
1:14 start: Gmail 🤣
2:21 old protocols
3:14 email server
3:50 encryption and metadata
5:15 MTA and SMTP
6:15 Snowden
7:18 STARTTLS
9:04 #1 Hide your IP address
9:55 #2 Segregate your email
11:08 #3 Limited use of real name email
11:59 #4 Don’t use Job email for personale use
12:45 #5 State Players
13:23 #6 Set up your own email server
14:18 #7 Use alternatives to email
15:24 #8 Download email and POP3
16:28 #9 No contact list
17:46 #10 No phone number for 2Fa
18:47 #11
19:18 #12 Dont trust Encrypted services
20:51 #13 Gmail for throw away email only
Ty brother 🫡
Dear Mr Braxman,
Thank you so much for your 15 e-mail tips, they were really good, but however people like us can forget some of them. So please put these tips in writing so we can download them and refer to them for our remembrance. Thank you and all the best for all your future videos. ...... Sunny.
To get to the 15 points skip to 9:05
Perfect! This makes me want a time stamp for each of the 15 points!!
Essential information, especially now... Thanks Rob.
Thank you so much for this info. I was just thinking about email privacy🤓👍
Much note-taking was done while watching this video!
I am studying IT focused in programming in school and I watch these videos you make and realize that I know nothing 🤣
Nice, ship-shape cabin Rob.
Thank you Sir for enlightenment. I will do it and hope it work. I feel that live with open book.
Rob we're in big trouble 🇨🇦
I know he doesn’t like to talk about politics specifically, but I’ve been thinking about getting in touch with him on Brax.me about mentioning this.
One of his previous videos not to long ago talked about a UK company doing all this research on what people are looking at on the web, mostly with a ‘far-right’ slant, and Canada was in there.
We are the only western nation considering a China-style Great Wall of internet censorship.
Bill C-10 if passed is the beginning of the end…
Invaluable information as always. Many thanks! 😊👍🏼
What email should we use for shopping--as it will always reveal our shipping address, partial payment details, and most if not all of our real names? What's the best way to limit this information via email?
Mahalo Plenty for great advice....
Mr. H ® Approved ✌🏼 Love ya Rob
Thank you so much, perfect timing for this video
Tanks for the Ting link, learned something new as usual.
I RESPECT U WITH SUCH INFORMATION ON HOW BIG TECHNOLOGY IS VERY CORRUPT.. THANKS I WILL KICK THIRD PARTIES OUT OF MY EMAIL FOREVER.
Rob you bring a very rational and down to earth explanations to a very complex subject. Thanks for this. How would you reverse years of being integrated into gmail and other "free" platforms with all this new knowledge?
That is so much to take in brax but are so right,this is very important but I'm not very techy
Thanks for the video !!! It was great !!
It would be great to show us how you do to make our own email server and most secure and anonymous :))
Keep up the good work !!!
Great information. Thank you.
Hey Rob just thought I would mention that after finding by accident that Aol had taken a voice print of ME with out consent I sent a letter asking for an explanation,,,They replied they had sent my request up to another office and would get back to me....This is not the first time a company has done this to me and never have they been able to provide me with a law or statute that allows them to legally do such a thing,,,,,,,,,Take Care,,,,,,,,Douglas
well, in the case of using the phone as 2FA then we have no other option but to use it, we have to use a different line per site to avoid the matching. what other 2FA can be used to avoid this other than phone, with Google services I think we have no other option.
So what's the advice if you actually DID use part of your name for your email address? I understand why not to use it, but these email accounts are 15+ years old...not so easy to just stop and switch...anyone gone through the laborious process of switching over to a more securely-named email address? Thanks for the video and information!
No. Keep it. buy limit its use. I discussed that.
@@robbraxmantech Thanks! Sorry, I got a bit anxious with posting a question...posted after only watching half of the video 🤭... I'll finish watching though 🙂
14:19 Anybody know what these are? Do they really exist? If so, why do we use email for anything?
If only we would stop thinking "free = free" and realize that it is always a trade, albeit a hidden one, we'd be much slower to grab whatever is free and sometimes, just cheaper. Would you be willing to pay for an email account, monthly? You see, servers, software, maintenance and data cost money, that has got to be covered somehow. No email is "free", there is no such thing as "free space", somebody HAS TO pay for it. And it's you, and the way you pay is buried in and derived from 1500 page long Terms and Conditions that no user in the entire history of computers has ever read. Now sometimes, this can be pretty innocent, just a ton of ads, that's how it started. Now give that situation 30 years and a million of brainstorm sessions all around the globe by money-hungry companies and career hungry individuals and try to begin to understand they have by now exploited every smallest nook and cranny that is not very clearly illegal. And we can not grasp it, because it's too complex and we're busy... living.
Congrats for your very good videos. A really good job
THANK YOU SOOOOOOOOOOOO MUCH...U ARE HELPING ME TO KICK NEW TECHNOLOGY TO THE SIDE IN THE WAY I CAN.. I MUST CONTROL MY OWN PRIVACY.
Thank you. These days you can encrypt data into pictures. Whether as a deliberate symbol, meme or encoded into the picture data itself...
This week gmail started requesting new permissions. Wassup with that?
I've been using my own personal name domain name for years (>20), but limited to specific use as mentioned (gov't, bank, family, places with full name already), but I use gmail for generic and never associated name, but now I'm wondering about either. My personal domain has been getting much more spam lately, which it never did, so there is a leak somewhere). I was questioning Google Voice, but now two people have said it's okay. Like my credit card, I wish I could generate virtual/temp phone numbers. Interesting mention of Google Gmail, I've always kept it generic/hidden, but places want it for password, so your mention of stores was good, essentially anything that can triangulate with other info. When will profile photos be a concern? I suspect facial recognition and database linking is already occurring.
Thank you, Rob!!!
Thank you Rob
since this is about email, ill ask again. . .
what are your thoughts on Criptext email?
Perhaps, getting off the Internet all together would be best. I survived quite well for 50 years without it.
Good idea - and it may be our only option as the nets close on all of our possible options in the future.
In many states, voter registration forms, mailed ballots, motor vehicle departments and state web contact forms all ask for your email contact address. And they sell it, along with all of your information.
Please make a comparison video about Google vs. Apple in terms of privacy. Thanks
Rob, can you update this... and do a comparison of the meail providers? Proton Mail claims to have > 100 MILLION users now so I'm not sure it is an automatic flag like it was years ago.
my domain provider got hacked, i know coz i started getting spam calls trying to sell me webdesign services for my domain which is supposed to have records protection.
I purged all my emails and put them in folders if I needed them. So last few days I removed about 2000 old emails. I am already getting less spam emails. That is my biggest concern. Junk mail! Even if you unsubscribe it doesnt stop so sending them to spam. Does putting them in folders and off the in ox keep them private?
🛡🛡🛡What's the simple tool? 3:08
One hundred THUMBS UP!
Now when will we be able to get yo vpn via snail mail, while we have that choice!
If using an encrypted service yourself how can you protect mail that is sent to a service that doesn’t use encryption? That has to be the most likely scenario right now,. I can see Amazon, eBay or a mom & pop store moving over to end to end encrypted for us. Is it just keep the email and IP as anonymous as you can?
A VPN helps, but cannot always be working. Using the mail client Thunderbird helps, because it prevents auto-arrival of email when the VPN isn't active...unlike other mail clients. Unfortunately, there's no Thunderbird for phones. So I do not link email to any phone and reserve it for only use with a computer.
I read somewhere that the information in an email is as exposed as the information on a postcard.
I said that
@@robbraxmantech Well there you go!
You use Google voice for two-factor authentication? Wouldn't using a Google based product or service expose a person to additional surveillance? I mean, if they track and record everything that we do, then that would link a person to an additional service or otherwise.
What messaging app did you say you use that doesn't require an email or phone number?
How do I start from scratch?
This is what I'm thinking:
1. get a degoogled phone
2. new linux computer
3. all new emails, following tips from this video
4. all new logins with fake info
5. new phone number
6. Use all the old stuff from above but only for disinformation
7. I need to copy and paste posts to avoid linking me by key stroke trackers
8. Router VPN and TOR browser or brave
What did I miss?
Your actions depend on your "threat model." Watch OPSEC subject titles on this channel to plan your escape to more privacy - you've got a GREAT START with a comprehensive list!
You're missing "browser isolation," the most simple and free thing to do for starters. Plus, get off Facebook and all Facebook-owned apps. Be sure NOT to download TOR browser until you have a working VPN, you'll get on a "list."
I have several domain names with email server service. You say if we are a group that wants privacy and security we can use this if we communicate within the domane? You say this could be safe? For ex unconfortuble journalists that might get some attention from the state. I also remember you having a free email solution?
I understand where some people may want to hide their political views shared in emails, perhaps for business purposes. That may be appropriate and is a matter of personal choice. However, we should never have to fear retribution from government for our speech. Consider the price we pay
when we begin to censor ourselves.
Govern = control, Ment = mind. Mind control.
yes, great point. Unfortunately, corruption doesn't need ethics - it only needs opportunity. This channel points out how the technical opportunities exist, so they are GOING to be used. Gradually is there *is* now retribution and effects from holding certain "opinions" - and it's only a matter of time until "profiling" and categorization WILL be used against people - in fact, this is already happening...and it's frightening!
Very good video and information. Do you have email services that you like using or recommend to people (if they follow the tips that you provide)?
One to consider might be Startmail which is from Startpage.
Giving it an initial look, it looks like a good option. Wouldn't having a paid email service paint a digital target on my back?
@@kotanagant9768 ...not if you have other public emails for other purposes.
Hello Rob,
Is it possible to make VM on Android phones (the same as Windows) to have more Security?
Thanks.
See on this channel a more recent broadcast when he answers your question, titled: "Using phones with no SIM" ruclips.net/video/qhzU0NHIBrc/видео.html
@@mistyculous9644 Hello, Yes, I have already seen the video you sent me its link (and it is interesting), but I am wondering if it is possible to make any "Virtual Machine" on android or a 2nd user account with limited authority on Android, the same a Windows?
At least to defeat the phone from viruses and malware by having, for example, a user with limited account authority or a VM on the phone.
I used Gmail, creating a new anonymous address, for correspondence concerning a ticket court proceeding. Google, at one point, refused to acknowledge my legitimate password, and I lost access.
whoa... That happened to me. Almost lost a blog I'd been adding to for over ten years. It was only solved by giving them an old burner phone number that I happened to have laying around.
@@mistyculous9644 Good deal. I don't give Google my phone number. They know it is my email, I gave them the correct password. They claimed it was wrong.
BECAUSE CORRUPT GOOGLE WANT U TO GIVE THEM UR INFORMATION WHICH IS NOT RIGHT BECAUSE AFTER U GIVE GOOGLE UR REAL EVERYTHING YOU HAVE NO PRIVACY AFTER THAT.. DID GOOGLE ZACKY ZACKY BURG GAVE US HIS PRIVACY INFORMATION TO US THE CUSTOMERS..NO. BECAUSE HE WOULD GET CURSED OUT TO HIS FACE HOW CORRUPT HE IS WITH OUR INFORMATION THAT HE IS USING FOR FREE. 😄😄😄😄😄 SEE WHAT GOOGLE CEO'S IS DOING TO HUMAN BEINGS.
I thank you for posting this this is what they are doingto me right now. They won’t let me jn my accounts to download my data
@@gumby-galbraith641 I am considering going to court and filing a subpoena. My name is all over the court proceedings.
I even gave them a valid password. They try to compel you to link it to other accounts.
Subtitles are missing.
Rob, did you forget the subtitles.
Please install the subtitles again, like on your other videos.
Scary frightening overwhelming content from an utter tech darling.xxx🌹🌹🌹❤️❤️❤️🌲🌲🌲🎄🎄
Happy holidays!
@@robbraxmantech you too. Merry Christmas and Happy Holidays.xxx
Hey Rob, thank you!
Thank you 💓
What does it mean "to have your own server". Do i have to have it in my home, phisically, or is it ok to buy some VPS server and set up my server remotly? In switzerland or some island, or on Africa for example :)
If you set anything up outside the US, it will be outside the protection of the 4th Amendment.
Rob endorses using "linnode" servers, which don't exist in your home. Rob has said in other videos that it's best to not have your own server located in your home, actually.
Can you forward your Gmail to something like k9 mail to make it more secure and stop Google tracking?
Yes that's the only option if you don't want Google tracking
@@robbraxmantech Perfect. Thank you for your quick response. Love watching your content. Keep up the great work 👍
@@robbraxmantech just to clarify, would that be to another email address, or would using the Gmail account through k9 mail work to stop tracking?
How about writing the e-mail on an offline computer, then archive it with 7z and password-protect the archive, then send it using Thubderbird in Linux?
Will that do?
It would have to be an awfully long password.
That is a nice yacht!
I think 10 Minute Email is a pretty useful tool in this regard as well
😆👍🏼 pink bras and underware! Bah haha haha!
Rob - google is horrible, also Rob - I use google voice
Hello Rob ! ...how about if you attach a pdf file to your email...a file that requires a password to open it ? can that also be read from anyone on the way ...? my lawyer does it and say its safer ...but listening to your video here I am not sure anymore.???
Hi Peter - that is a great idea! I cannot answer your Q in relation to 3-letter agencies, but it seems like a perfect solution for general privacy. For instance at work, and an old buddy wants the low-down on your company as he is thinking of applying for a job; or communicating with a lawyer or friends whilst you are going through a bad divorce and you do not want a plain-language record flying about ther internet.
Nice boat, Rob
So, segregating your emails is good advice, and I do this to a certain extent. However, since most of us haven't been using VPN, and most of us access the various email accounts from the same device and IP address, and the government has access to and stores all that data, then can't the government figure that out that all your email accounts are probably the same person?
Do the permissions given to the company that owns an app I install survive uninstalling the app?
yes, depending on how the app is designed. That's why you should always read the reviews before you install the app where people complain about the app doing this.
If i have my own email server can i forward my gmail to that server?
So by subscribing and liking this video, I've just gotten profiled?
Yep
They did it again, with No notification whatsoever.
great tips! thx
I have several G mail email accounts, including a gmail for junk, (store coupons and other stuff like that), which I also use for my main RUclips account creds and which doesn’t have my name on it, apart from where I registered years ago; another gmail account for business, and some spares. My main email account is my old Mac mail, still @mac.com . I’ve been very interested and quite annoyed to find my Mac mail marks my daily Epoch news as junk mail almost every day, and I have to mark them as not junk. It doesn’t do that with much else including junk which I often have to mark as junk. Once a I have marked it as not junk it should stop marking as junk, but it doesn’t. I’m just starting to watch this video as a I write and I’ll be interested to see if and how my mail is filtered by Apple down to my politics!
After a few paychecks, I'm just getting a new phone. Let the youtube account just live and age in the ethersphere. Stored in a tiny little corner of a server rack. For some future child legend to stumble upon and spark a world Renaissance.
Tengo hon miomi lla no tengo el Samsung me cambien a miomi
I use throwaway phone numbers for authentication.
Dear Rob, Ting has been bought out, your plan that you are on , is NO longer available.
$6.00 per device no longer exist, unless you had a previous contract.
Yes, now Ting appears to be owned by DISH Wireless L.L.C.
Was unable to login due to google or upset up account google blocked me very concerned.
I am sure Sundar Pichai knows my favorite adult entertainers.
After 180 days your emails on the server are considered abandoned and are available to the government. So have pop3 delete them before that.
Employers can delete emails to get ride of you record of the email.
They can do whatever they want to the email as its considered the employers property
I have seen that happen sometimes when corporate sends an email, and it disappears before I get around to reading it.
another good reason to not do anything person on your corporate email account
for next episode, how about on deep web voyage?
What do you mean? Can you elaborate? Provide a link?
So in short, don't use the internet. Got it.
But in seriousness, best advice given right here. Segregation is key.
Is it safe to use Private Window with Tor when using Brave browser?
Not really. You will stick out because of the user agent among other things. Use the tor browser if you really want to be anonymous. But it still is better than nothing.
in case you question the opinion of the person above me, i was a long-term tor user a few years ago and they're 100% correct. user agent narrows down a lot. plenty of sites can also do certain things to tell you're using private browsing. ideally if you're going to use tor at all you're also not using windows.
it's still better than nothing, but it's not particularly good or safe. remember, the only thing worse than no security is a false sense of security.
@@readme_nfo Thanks. I really meant to use Tor private tab when sending emails.
@@macster1457 Possibly, depending on your use case. Depends on your email service, your threat model, what type of content you're sending, etc.
If you just want basic privacy from your ISP for an anonymous/burner email for example, that would be fine. If you're trying to send very sensitive info from an email that's directly attached to your name, then it wouldn't make sense.
Thank you
Love the disinformation plan