Incredible Dangers in Browsers (Affects all of them)

Поделиться
HTML-код
  • Опубликовано: 20 ноя 2024

Комментарии • 717

  • @tonicrvnts
    @tonicrvnts 10 месяцев назад +103

    Many coworkers are so concerned about privacy even covering with tape the built-in camera on the monitors at work but at the same time make their life, location, thoughts, etc. public for the whole world to see through FB, Instagram, tiktok, Twitter, etc 🙄
    🤦‍♂️

    • @user-bubstech
      @user-bubstech 8 месяцев назад +1

      Sounds like me 😂

    • @MultiEviscerator
      @MultiEviscerator 8 месяцев назад +23

      I know what you mean, just like a heavy person ordering two Big Mac's, large fries, chocolate sundae, and then ordering a diet coke.

    • @RS-bo8qi
      @RS-bo8qi 7 месяцев назад +3

      Like agent smith said : ignorance is a bliss.

    • @FictionCautious
      @FictionCautious 6 месяцев назад +5

      Ego-powered automatons.

    • @incognito595
      @incognito595 3 месяца назад

      Use masking tape or small snippets of duct tape to cover the cameras.

  • @AdamTheTruthSeeker
    @AdamTheTruthSeeker 10 месяцев назад +12

    For years I have told people about how violated we were where we use anything using the net. One day Iwas driving my semi as I was speaking to my step father about his up coming retirement. You see he is 6'6 and his legs have been giving him problems and so that's what particularly we were discussing. And so after the convo we hung up and it wasn't 10 min later he was calling me back asking me if I had contacted a doctor about his legs. And I said "no" I'm still driving and we just got off the phone. Then he proceeded to tell me how a doctor called him about service for his legs. I was stunned. Since then I play in settings so much I mess things up now turning everything off. I'm like the guy in comments that want to live off the grid in the woods.

  • @Zundfolge
    @Zundfolge 11 месяцев назад +540

    Every day the idea of building a shack in the mountains and living off the land is more and more appealing. :p

    • @TimJSwan
      @TimJSwan 11 месяцев назад +8

      No. We just need to make our own devices, use bsv, and build on original philosophies by guy who made gnu. We just need better stuff. Not just a couple half used half available things like tor

    • @UNcommonSenseAUS
      @UNcommonSenseAUS 11 месяцев назад +1

      We need to setup our own comms networks
      The government has become the enemy.

    • @grayrabbit2211
      @grayrabbit2211 11 месяцев назад +43

      I was in Amish country last month...and while watching them plow the fields with horses, I realized they'd never had to call Comcast before...and suddenly their lifestyle seems very appealing.

    • @Randytherumbler
      @Randytherumbler 11 месяцев назад +10

      If you know what you're doing..... already had experience living off-road,off the grid,and already knowing how to survive..... including knowing how technology works by being a licensed HAM radio operator,then no problem.
      Just like Rob!

    • @BeyondPC
      @BeyondPC 11 месяцев назад

      ​@@grayrabbit2211Pro tip: CenturyLink at 945Mbps for $75 is sooooo much faster. Plus they never try to manipulate our speeds and the router doesn't reboot randomly. We have never had to call support or unplug and rest devices...

  • @Soniboy84
    @Soniboy84 10 месяцев назад +26

    Rob, you should create a solution to do browser separation without the additional pain of maintaining 4 different browsers.
    It could be just a front end ui that encapsulates all 4 browser application, or something similar

  • @RealMadDogMoney
    @RealMadDogMoney 7 месяцев назад +12

    Rob, fellow boater here. Anyone that DOESN'T own a sailboat wouldn't recognize it, but it's cool to see you recorded this onboard!!! I spent 10 years as a liveaboard and can't wait to get back at it!
    Keep fighting the good fight!! Cheers

    • @angelo9176
      @angelo9176 6 месяцев назад +2

      Man how the hell did you notice this wouldn't of thought of this until you mentioned it but now I think those are windows behind him also there is a very slight lateral movement in the video and then that creaking occasionally 😂 think that boat looks nicer than my house

    • @CyberSnakeEater
      @CyberSnakeEater 3 месяца назад +1

      I lived on a sailboat for 10 years and I didn't realize until I read your comment.. His boat is too neat! haha

  • @hootiebubbabuddhabelly
    @hootiebubbabuddhabelly 10 месяцев назад +12

    Also, I've often wondered how "trash" and wrong passwords or pass codes are handled. Particularly, in the US where "trash" is considered "fair game", from a legal standpoint. BUT, my phone requires a pass code to get into voicemail and I don't use it very often so, when I used it the other day, I had to enter just about every 4 digit passcode I've ever used, a couple of which are still in use for other things.

  • @cottawalla
    @cottawalla 11 месяцев назад +15

    Never let anyone use your account on any device. Create an account for them, even when you trust them. You can only ever trust their conscious decisions, and nobody is 100% conscious of the consequenses of their decisions.

    • @SpaceCadet4Jesus
      @SpaceCadet4Jesus 11 месяцев назад +3

      True that. Good advice.

    • @windycity70
      @windycity70 23 дня назад +1

      I made that mistake with kids I babysit

  • @lupeegnino5694
    @lupeegnino5694 11 месяцев назад +77

    Hey Rob, suppose I’m who you call “a normie”, been listening/watching you for several months now. learned so much from you! Thank you!!! Limited to really invest my time fully, into learning IT as well as you know it, by a ‘calling’ of my own. Namely, for example, growing my own food and all that involves. But it isn’t more important than protecting my privacy! This video is an example of why I value your content so highly! As a” Normie”, don’t always understand what you try to convey, but here I do. You offer simple/real tips that I can implement myself, & in my “normie” language, again, i truly appreciate your generosity of knowledge!!! Very soon i WILL purchase one of the de-googled phones, VPN, & email services you provide.
    Until then (& beyond) please don’t stop posting what you do! Your explanations & suggestions are helping me keep my data more private while allowing me to spend more of my time into perfecting my calling. youre a valuable member of society! Even though you don’t hear from many of us often or we are unable to catch you live… doesn’t mean you are not being heard, for we hear you!!! Thank you my friend! This video has been of great service towards maintaining my personal controls & privacy & really seeing what sort of thieves are in control of media. Happly Holidays! THANK YOU!!! Lupe

    • @anderslonn730
      @anderslonn730 11 месяцев назад +4

      Well said, agree to that!

  • @CarlJones14
    @CarlJones14 11 месяцев назад +47

    I wish you could do concise videos tackling each threat. I realise this is a lot of work, but it would help us on the tech fringe.

    • @MowiWowi
      @MowiWowi 11 месяцев назад +1

      666...I bet u don't even believe in God....satan has u

  • @iteerrex8166
    @iteerrex8166 11 месяцев назад +31

    1. Clear/delete: cookies, and unknown browser download folder items.
    2. Do not use: auto fill, password manager, browser extensions, and facebook.
    3. Use browser isolation. One only for all google stuff, and one or two other for the rest.

    • @terry_willis
      @terry_willis 10 месяцев назад +2

      Thanks.

    • @iteerrex8166
      @iteerrex8166 10 месяцев назад +2

      @@terry_willis No problem, If you’re new I’d suggest to checkout some of his other videos as well, cause this is not everything to be concerned about.

    • @RevWillBreeze
      @RevWillBreeze 9 месяцев назад +3

      I went on step further, machine isolation. I run W11 with Edge, Chromebox with Chrome, and Linux mint with Brave, using 3 different CPU's

    • @iteerrex8166
      @iteerrex8166 9 месяцев назад

      @@RevWillBreeze Nice, that should keep them 😵‍💫

    • @milire2668
      @milire2668 6 месяцев назад

      @@terry_willis u SHOULD use a password manager but not the built in browser ones.. keepass is a good one, os n pretty safe n easy to use

  • @0mnis14sh
    @0mnis14sh 11 месяцев назад +35

    Just a fun tip. All links that are written in video descriptions and comments will have youtube/google tracking associated with the link. So always manually copy and paste links, don't just click them.

    • @omahanprabla3058
      @omahanprabla3058 11 месяцев назад +2

      Delete the rfid and ref strings as well

    • @thebrowns5337
      @thebrowns5337 11 месяцев назад +5

      can you post a link for more info? 😂

    • @sumbodee3
      @sumbodee3 11 месяцев назад +1

      that's how I used to google. I never clicked on the results, I selected the url written under it and dragged it to a new tab

    • @SpaceCadet4Jesus
      @SpaceCadet4Jesus 11 месяцев назад +1

      ​@@sumbodee3Use to? Why change? And could you remove those glasses so we get a good look at your identity, please?
      😅

    • @sumbodee3
      @sumbodee3 11 месяцев назад +1

      @@SpaceCadet4Jesus I stopped giving a f Ain't got nuttin to hide

  • @Metal-Detecting-NC
    @Metal-Detecting-NC 11 месяцев назад +19

    Thank you for this video. I was curious regarding cookies, super-cookies and ever-cookies and the security risks they pose.

  • @barrydengler7883
    @barrydengler7883 11 месяцев назад +5

    i have a bunch of comments here.
    1- you're just sticking your finger in the dam. browsers are hundreds of thousands of lines of code that cannot really be vetted. you code. you know about combinations. you know that the code isn't really that vetted. the industry just doesn't test that well. browsers are black box, mitm, out of the gate.
    2- how about pulling a stallman, and curling all the stuff you desire. advocate for less dynamic web. advocate for sites that don't serve pages that have external js links. advocate for sites that abide by a "limited complexity" ethos.
    3- the consumer is redirected into better behaviour by example. this ain't by playing stick your finger in the dam ad infinitum. a rewrite/redesign is needed to clarify the boundaries.

    • @windycity70
      @windycity70 23 дня назад +1

      You sound like an employee doing damage control

  • @jms019
    @jms019 11 месяцев назад +16

    The main problem is that browsers are very complicated constantly changing bits of software and dangers especially of interactions with third parties tend to be discovered too late. This can only get worse.

    • @BillAnt
      @BillAnt 10 месяцев назад +1

      The constant changing IS one of the problems with browsers. Even if most bugs have been worked out, as soon as new features are added, they can potentially introduce new bugs which can be used as back-doors by clever hackers.

    • @JoeGator23
      @JoeGator23 2 месяца назад

      @@BillAnt And... the next generation of hackers will be hyper-diligent AI, and 100 percent non-human.
      AI snooping will advance itself at an exponential rate, constantly improving its capabilities, as well. Humans are no more than cattle now for their masters. Their vanity and egos keep them from fully realizing the extent that they are immorally tracked, followed and manipulated.
      It's a divine comedy of ignorance now- until they round us all up.

  • @karsh001
    @karsh001 11 месяцев назад +2

    I have used browser partitioning for a long time It's super easy.
    An alternative is to use a virtual machine that you reset after each use. That will wholly avoid the super cookie issue, bit it' clunky and it os easy to make mistakes.
    If you still want to go that route here is what I did for quite a while. OS at the time was a self-compiled, hardened Gentoo.
    Browser partitioning for every day use.
    1 browser for google (keep cookies)
    1 browser for surfing (delete cookies at close)
    1 browser for non-google logins (delete cookies manually)
    1 VM for facebook (static disk)
    1 VM for banking and shopping (static disk)
    1 VM for browsing (reset disk after each use)

  • @UNcommonSenseAUS
    @UNcommonSenseAUS 11 месяцев назад +28

    The speed at which the browser fingerprinting becomes precise is alarming

    • @a.randomjack6661
      @a.randomjack6661 11 месяцев назад +4

      I use a browser extension, agent... something, that allows me to change browser fingerprint to any one on a long list. I change it every time I use one of the five browsers i installed.
      I also use that Safin port app.

    • @UNcommonSenseAUS
      @UNcommonSenseAUS 11 месяцев назад

      @@a.randomjack6661 user agent switcher.
      Useful against novice adversaries, experienced however will see through it like a fly screen...

    • @DarkGhostHacker
      @DarkGhostHacker 11 месяцев назад

      ​​@@a.randomjack6661it would be great if there was a step by step video on this. A tutorial that goes in depth on how to set up and explaining the details of what each one does. For android devices

  • @majorgnu
    @majorgnu 11 месяцев назад +21

    3:57 The point is that the legitimate server disabling plain HTTP does *not* prevent a MitM attacker from serving a plain HTTP attack site of their own.
    HSTS makes it so that the browser will refuse to use a plain HTTP connection to a website, for the duration specified in the HSTS header. This prevents that kind of MitM attack against browsers that have already visited the website in the past.
    Also, HSTS supercookies don't work like regular cookies, you don' get to store arbitrary data and then retrieve it later at will. It just causes the browser to refuse plain HTTP for a set time. The way that it can be used to fingerprint browsers is not immediately obvious and requires clever use of a number of phony domains. Accusing the people who came up with it of "not caring about privacy at all" when it requires a sophisticated side channel attack to turn it against users is completely disingenuous.

    • @FuckingChrisKupina
      @FuckingChrisKupina 10 месяцев назад

      So I built this impenetrable safe. Then I used a bike lock to lock it.

    • @kevcube
      @kevcube 10 месяцев назад +2

      agreed, I skipped to this point at first because I don't want to waste 20 minutes of my life and that point was a lot of misinformation and mongering.

    • @BillAnt
      @BillAnt 10 месяцев назад

      You could enable HTTPS only on your browser, so if an MITM serves an HTTP page it simply won't work. While 95% of websites use HTTPS nowadays, there are still some out there which do not. It's a two edged sword.

    • @effsixteenblock50
      @effsixteenblock50 4 месяца назад

      I was scratching my head a bit with his explanation as well.
      The main problem with HSTS is that it records the sites you visit. If you delete the entries, they'll be written to the file again if you visit the site again.
      Maybe some sorcery with write perms in the folder that contains HSTS file would do the trick.

    • @majorgnu
      @majorgnu 4 месяца назад

      @@effsixteenblock50 The problem isn't that the list of visited sites is retrievable from local files. The problem is that HSTS can be abused by malicious web service operators to fingerprint browsers.
      HSTS tells browsers to use HTTPS and refuse plain HTTP, for a specific domain and duration of time.
      That causes an observable difference in behavior: whether or not the browser is willing to connect via HTTP.
      This gives you 1 bit of information about the browser that doesn't go away when you clear your cookies.
      1 bit isn't enough to uniquely identify a browser, but that's 1 bit *per domain.*
      Multiply that by a large number of domains (operated by the same entity with the express purpose of fingerprinting) and you've got yourself a way to store a persistent unique ID in a browser against the user's will.

  • @glennt1962
    @glennt1962 11 месяцев назад +4

    Appropriate answer is don't let anyone use your PC and especially your login or create a separate guest login.

  • @cori1302
    @cori1302 11 месяцев назад +16

    I am so glad you made this video!
    This is a whole fuzzy grey area that I have always been suspicious of.
    I tried to learn some of this from a Cyber Navigator at the library, and later found out he hacked me and others...
    If you can do a whole video series on each of these aspects, that would be great.
    Am clueless.
    What kind of course can one take to learn more about these things?
    Learning to code seems like a long involved, abstract process. I am no good at math.
    Is it needed in order to use a Command line?
    Questions like -
    I don't use a browser, I just use a search engine.
    Or pay directly on the merchant website...
    Browsers are only needed for bookmarks or tabs...
    If your phone has malware, using Signal or a password manager wont help...
    Are there more secure keyboard apps than Gboard on Android?

    • @alan4sure
      @alan4sure 11 месяцев назад +1

      You can't use a search engine without a browser.

    • @shallex5744
      @shallex5744 11 месяцев назад

      @@alan4sure well of course you can

    • @thebrowns5337
      @thebrowns5337 11 месяцев назад

      ​@@alan4surewhat about a search motor?

    • @NorthernChimp
      @NorthernChimp 11 месяцев назад

      @@thebrowns5337 If you access anything online, you are using a browser. That's how it works. When you use the "Google" app on your phone, for example, it uses the System WebView, a faceless browser engine that all non-browser apps use to access the Internet. (Same for RUclips, Spotify, your bank...) And links you open use your default browser, even within the app. (I managed to have no default browser, so I have the choice every time.)

    • @NorthernChimp
      @NorthernChimp 11 месяцев назад

      @@thebrowns5337 What do you mean by 'search motor'? A search engine (called "moteur de recherche" in French)? Unless you have the whole index stored at home (a massive data center) you need to send your query to a remote server. Using a browser.

  • @MurksvomGurk
    @MurksvomGurk 11 месяцев назад +6

    Hack #2: You have passwords stored locally in your chrome browser, you pass your computer to your non-programmer cousin, he logs into his google account (which has "sync on"), all your passwords are copied to his account without further warning or notice. his account gets hacked by malware on a different computer, you are hacked. I saw this happening in practice several times.

    • @acewickhamyoshi8330
      @acewickhamyoshi8330 11 месяцев назад

      Ah yes , sunds like how australian malware follows us in shops and location ,,, ,,, our government is the hack , and they encouraged australians to all manditorally go online , with 30 million IP servers overseas none actually in australia we have internet shutdowns nationwide ,sometimes twice a month, did you know the aussie internet still runs on Windoes 95 , cos our politicians thought to never vote to approve an upgrade over the past 30 years ,,.no wonder we have faulty internet well except for American Intelligence base that is always on,

    • @SpaceCadet4Jesus
      @SpaceCadet4Jesus 11 месяцев назад +1

      Was his sync ON?
      Best to let him use your computer under a guest account.

  • @annacurransmotherofmeghanc1841
    @annacurransmotherofmeghanc1841 11 месяцев назад +8

    Your easy to digest🤔info is invaluable for so many people, thank you for pressing on and your continued diligence with handling RUclipss obstacles. God Bless!!!🙃

  • @kza-pm2pg
    @kza-pm2pg Месяц назад +3

    Surveillance state brought to you by private enterprise....Ironic

  • @MowiWowi
    @MowiWowi 11 месяцев назад +8

    Google Chrome logo is a stacked 666 no joke

  • @de-bodgery
    @de-bodgery 2 месяца назад +4

    Well shit! I HAD ad-privacy turned off in Chrome! I got a Chrome update and it was all turned back on! You might want to talk about/investigate that!!!

  • @additudeobx
    @additudeobx 28 дней назад +1

    Thanks. Everything I listen to from you is a learning experience.

  • @Easy_Skanking
    @Easy_Skanking 11 месяцев назад +13

    You mentioned these hidden and secret Google and RUclips cookies they imbed in browsers. Could you cover their removal in a video?
    Thanks again for all of your knowledge and help, sir!

    • @SpaceCadet4Jesus
      @SpaceCadet4Jesus 11 месяцев назад +1

      No way. We don't have ALL your information yet. 😅

    • @mariocamspam72
      @mariocamspam72 11 месяцев назад +1

      ​@@SpaceCadet4Jesus"We"
      Are you a Google engineer?

    • @josjedan-b8j
      @josjedan-b8j 10 месяцев назад

      thats a hackers job

  • @i-changeus
    @i-changeus 10 месяцев назад +1

    Recently Snowden said (Bitcoin keynote), I am paraphrasing as I can't recall the exact words, " If you have to go thru a ton of circumvention and high tech magic to not be tracked, that's NOT freedom". I couldn't agree more! So the takeaway here for me is start fighting for our freedom at the state level, and pray for our country, 2 Chron 7:14

  • @a68k_de
    @a68k_de 11 месяцев назад +3

    That's why I hate modern browsers, especially since Firefox version >35.
    You no longer have any control over your data and what the browser can and is allowed to do.
    To this day I still don't understand why Mozilla sold itself and gave up itself. Not only to mention the "great" developers......

  • @JohnAlbertRigali
    @JohnAlbertRigali 11 месяцев назад +2

    I have a similar web-browsing strategy, but yours is superior. I’ll switch to it soon.

  • @jackwaycombe
    @jackwaycombe 10 месяцев назад +3

    What I constantly wonder about is why there aren't constant class actions against theft of bandwidth?

  • @BrianHeimbuecher
    @BrianHeimbuecher 11 месяцев назад +5

    Ironically I think we'll look back at the 2020's as the 'good old days before we were tracked up the wazoo'...

  • @RandomUser-lp1yh
    @RandomUser-lp1yh 9 месяцев назад +1

    Not only that I use browser isolation I also use "system isolation". I access RUclips through one of the browsers on my virtual machine while using my main system for personal activity such as shopping and stuff.

  • @jim8790
    @jim8790 11 месяцев назад +9

    I’d be interested to about partitioning that some browsers offer, like Firefox or Brave. How good at isolating data and threats etc are they? Love your work! Don’t stop. Ever!

    • @robbraxmantech
      @robbraxmantech  11 месяцев назад +13

      If that were a method I'd discuss it. I don't suggest it at all.

    • @jim8790
      @jim8790 11 месяцев назад +1

      @@robbraxmantech thanks for replying

    • @thomasranjit7781
      @thomasranjit7781 11 месяцев назад

      ​@@robbraxmantechwhat about Android phone?

  • @flywheeldk
    @flywheeldk 10 месяцев назад +1

    Thanks Rob - once again you've given us all something to think about.

  • @devnelson
    @devnelson 11 месяцев назад +2

    Great info! I'm more privacy savvy than most but some of these were indeed new to me. Super cookies?!

  • @LiebsterFeind
    @LiebsterFeind 11 месяцев назад +9

    Yes it would be an extension but how about a browser fingerprinting "fuzzing" extension that generates false information randomly every time you go to a site, or revisit it?

    • @effsixteenblock50
      @effsixteenblock50 4 месяца назад

      You can do that but there are javascript APIs that tell the websites what's really going on.
      If you spoof your User-Agent string, a javascript API will basically rat on you.

  • @katsiduzynski488
    @katsiduzynski488 22 дня назад

    thank you for sharing and explaining so clearly the various facets involved with computer privacy issues, as well as safety! Much appreciated!

  • @stopthink7202
    @stopthink7202 6 месяцев назад +1

    That autofill thing scared me. Thanks for brining it to my attention.

  • @Maxume
    @Maxume 11 месяцев назад +4

    I found the "DOM" acronym in the part about extensions really funny. The word, "dom," in Afrikaans means "stupid." Now, that's an appropriate acronym if there ever was one.

  • @notthedroidsyoulookingfor
    @notthedroidsyoulookingfor 10 месяцев назад +2

    I miss the days when I could take a dump without Google knowing... This days you get in the first two minutes the chemical analysis...

  • @haxortrent
    @haxortrent 11 месяцев назад +1

    Pretty incredible channel! Please tell me with specific instructions how to pay for your product without telling everybody that wants to know that I am paying for it

  • @dean5263
    @dean5263 11 месяцев назад +1

    Simple, easy to understand explanations. Glad I watched.

  • @deborahwalden8067
    @deborahwalden8067 10 месяцев назад +1

    You are looking ageless, Rob! I don’t get your notifications 😮. Signed up for sailing too. You are menza aren’t you. 🎉

  • @LB-tt7kx
    @LB-tt7kx 11 месяцев назад +7

    Any implications for using Safari? I use it almost exclusively w/ Brave to bookmark sites. Is this a bad idea?Sorry to ask if you covered this apple issue previously. Thanks so much Rob.

    • @nickplays2022
      @nickplays2022 11 месяцев назад

      There is a new vulnerability in Safari, iLeakage

  • @lordofelectrons4513
    @lordofelectrons4513 11 месяцев назад +11

    Hello Rob thanks for all the videos you have authored I find them most informative. I know you have talked about TOR, the onion structure
    and the multiple nodes excreta. Not being a typical browse have you done a focus on the TOR browser. It's strengths and weaknesses
    a how to on configuring it from the same perspective as this video if so I want to see it. If not I want to see it

  • @thehaqq3540
    @thehaqq3540 11 месяцев назад +2

    Great video, well done. Subscribed.

  • @vladimirmisata
    @vladimirmisata 11 месяцев назад +6

    Great Report Rob! Everything Is On The Ball. It Seems I'm Constantly Role-Playing With These Terds Considering A "Shadow" Is Constant In The Digital World, That Don't Play In The SUN - Expect It As Is, IS!
    Just Wondering Rob, What Are Your Thoughts About "User-Agent Switchers", Extension for Firefox header, ie Pretending to be a different browser?

    • @skate5652
      @skate5652 11 месяцев назад

      Unless you're spoofing default browser settings ( kind of like a tor browser does) user agent switchers help build a unique profile that can be tracked and used in a correlation attack. It's counterintuitive but they work against good opsec

  • @BFG_10G
    @BFG_10G 9 месяцев назад +2

    Very insightful video.

  • @mannyl3766
    @mannyl3766 11 месяцев назад +4

    Great content Rob! Thank you! What's your take on using LibreWolf with segmented containers? ...am I still at risk of cross-website tracking?

    • @robbraxmantech
      @robbraxmantech  11 месяцев назад +10

      Containers do not protect you. Stick to browser isolation

    • @NoEgg4u
      @NoEgg4u 11 месяцев назад

      @@UNcommonSenseAUS I have never used Qubes. But I am intrigued by its functionality.
      Are you using Qubes?
      Is it worth the extra effort?
      Does it perform well with modest hardware (say, an Intel Core i5, 16GB of RAM, and an SSD)?

  • @homemark22
    @homemark22 11 месяцев назад +1

    There's no way any protection can do but to completely cut out online presents

  • @StevenChristenson
    @StevenChristenson 10 месяцев назад +1

    It's refreshing to get the straight stuff! Thanks for this!

  • @DooglaGoodjh
    @DooglaGoodjh 11 месяцев назад +1

    Thank you very much, for the most important information and the best solutions you have provided us. God bless you and your business.

  • @ctg3d
    @ctg3d 11 месяцев назад +4

    Just a note, moving around on other browsers (FF, chrome, whatever), using the same IP.. doesn't mean much to people who are dedicated to scraping data. Especially when requests are within the same time frame or depending on the logs, months apart. Using a VPN could circumvent that.. since the scraped data would all be lumped over "everyone" using that IP making the data an irrelevant mess.
    Using a different IP per sectioned off browser, like using your phone's data and PC on home wifi.. can segregate it like you propose. Up until you merge the phone on wifi or pc tethered to cell data. You're probably reaching paranoid levels at this point though. ;)

    • @josjedan-b8j
      @josjedan-b8j 10 месяцев назад

      ok, but who are those 'people dedicated to scraping data'? Please, I wanna know who these bad men are. Do the smoke cigars?

  • @NoEgg4u
    @NoEgg4u 11 месяцев назад +10

    Rob, could virtual machines mitigate tracking?
    For example, if you do a clean install of Windows 10 as a guest in Oracle's Virtual Box, take a snapshot (before any web browsing), and then do your web browsing... then...
    ...when you are done with your web browsing, you can restore your snapshot (takes 2 seconds). Your Windows 10 guest machine will be completely restored to prior to your web browsing session.
    Is there any benefit to the above? Or is it a waste of time?
    Your solution, to use different browsers, is intriguing. But then each of those browsers is keeping a history of your activities. And what happens if you mistakenly use the wrong browser and visit a site that you were supposed to visit with a different browser?
    I figure that by using a virtual machine (even more than one virtual machine), then you would be completely clearing out whatever your guest machine had stored, upon restoring your snapshot.
    Your thoughts?

    • @DOUBLE0SEVUN
      @DOUBLE0SEVUN 11 месяцев назад +2

      I’d like to hear his thoughts on this too!

    • @robbraxmantech
      @robbraxmantech  11 месяцев назад +11

      Yes VM's solve a lot of these. But browser isolation is simpler to execute. You can do either

    • @NorthernChimp
      @NorthernChimp 11 месяцев назад

      @@robbraxmantech Is VirtualBox trustable, knowing it's from Oracle?

    • @cori1302
      @cori1302 11 месяцев назад +1

      I like the multiple virtual machines idea.
      And yes, it is a lot more work than just using separate browsers.

    • @a64738
      @a64738 11 месяцев назад

      There exist linux versions specially made to run in virtual machine with TOR as internet connection and special versions of Firefox that uses TOR for going on internet if you want high privacy...

  • @RAZR_Channel
    @RAZR_Channel 11 месяцев назад +1

    8:56 - when it comes to 2 women... I'm the man in the middle ... and I'm not ashamed to do so...

  • @tendamolesta
    @tendamolesta 10 месяцев назад +3

    As far as I knew Supercokies were removed from Firefox few years ago. Are they still a threat?

  • @powerpower1797
    @powerpower1797 11 месяцев назад +4

    RUclips attaks firefox and slowing down firefox is this a privacy intrusion?Because ad blockers?

  • @randycrager4074
    @randycrager4074 11 месяцев назад +2

    I was hacked and it came from Google. Had to change accounts at my Bank, Cell Carrier, so on and so forth. It was a pain in the butt.

    • @windycity70
      @windycity70 23 дня назад +1

      Thanks! No I will do all the changes now!

  • @spartanchuckles8743
    @spartanchuckles8743 11 месяцев назад +1

    Thansk for all you are doing to help us normies understand and improve on tech stuff relating to privacy/security. (as i see it, the more private you are, the more secure your data, etc is).
    its sort of sad that even if i got rid of all tech or kept my stuff off the internet, my personal info/data could and would still get online. tracking would be not near the same degree, but there are so many places (government, business, schools, place you work) that would collect a bunch of info on you and would use their computers and internet and have all that stuff accesible.

  • @jozefserf2024
    @jozefserf2024 11 месяцев назад +3

    My phones software update is now 1.6 Gb, how come?
    I can remember the days when you could fit Windows XP on a CD ROM.

  • @SatyaSanathani
    @SatyaSanathani 11 месяцев назад +3

    Thanks for the information.

  • @TheAtlanticGroup
    @TheAtlanticGroup 6 месяцев назад

    Love your videos thank you so much for the knowledge. Just a side note I feel like all of your videos for a few decibels lower in audio volume than other videos. Maybe push the volume DB's a little higher. Thank you again for your help

  • @jondoe9581
    @jondoe9581 11 месяцев назад +2

    Rob forgive me if you have all ready covered, could you make a video about google incognito tracking lawsuit ?
    Long time fan thank you for your work !!

  • @chenpu1
    @chenpu1 11 месяцев назад +2

    So. instead of keeping documents in the cloud, should we keep the documents only locally on one's PC and make the PC accessible remotely?

  • @dusanmal
    @dusanmal 11 месяцев назад +7

    Related question/problem I can't understand despite my technical background: This happens only on mobile, Android browsers no matter Googled or de-Googled. I typically use Firefox there so we can narrow issue to it. I follow same good privacy idea as you and on installation I disable any memorizing of anything (name, email, address fields, ccards,...). I also disable any "hints" for any fields such as URL, search,... However, now and then a website form will provide me with an option when I click on the field. Say I click on empty email field and below it will appear "suggestion" of the last email I typed in some other form on the browser. Need not be the email I use at that site but, suggestion appears. I have never seen this on desktop browsers and I don't understand where the info is coming from. Any ideas? (I see this as very bad as it somehow automagically bypasses my "ban" on remembering the form fields...)

    • @nunyabizniz3075
      @nunyabizniz3075 11 месяцев назад +7

      It's your keyboard

    • @nunyabizniz3075
      @nunyabizniz3075 11 месяцев назад +2

      Change the settings on your keyboard 👍

    • @LynyrdSkynyrd.4Ever
      @LynyrdSkynyrd.4Ever 11 месяцев назад

      ​@@nunyabizniz3075it's your keyboard _app_

    • @SpaceCadet4Jesus
      @SpaceCadet4Jesus 11 месяцев назад

      It's called auto complete, at least on Windows.

  • @macik7624
    @macik7624 11 месяцев назад +3

    Thank you for the video. This is super helpful.
    If I accidentally logged in on Google with a browser that is meant for non-google activities, is there a way to recover my privacy other than to uninstall/reinstall?

    • @robbraxmantech
      @robbraxmantech  11 месяцев назад +5

      Clear cookies and start again

    • @macik7624
      @macik7624 11 месяцев назад +1

      @@robbraxmantech  Thank you !

  • @edhahaz
    @edhahaz 10 месяцев назад

    Browsers are such beats I think it's literally impossible to stop fingerprinting. Seriously. You can do fingerprint even through basic features like css.

  • @rainchopper898
    @rainchopper898 11 месяцев назад +1

    Good explanation, I would buy a phone if I ever used one.

  • @mscir
    @mscir 11 месяцев назад +3

    Rob, what do you think of installing AdGuard Home on a Raspberry Pi to block ads and enhance privacy?

  • @phutrinh686
    @phutrinh686 11 месяцев назад +1

    very deep and informative content. appreciate your sharing.

  • @alals6794
    @alals6794 9 месяцев назад

    Whoa.....this info. is golden. I'm glad I came across this channel. Great info and new sub.

  • @rakly347
    @rakly347 6 месяцев назад

    Well, that explains how Humble Bundle so so often has book bundles about the stuff I was looking into to the past week. I'm sure it's not tailored exclusively to me personally, but if they can see the interests of their visitors, it's pretty easy to then offer anything related to that topic the next week.

  • @BinaryReader
    @BinaryReader 10 месяцев назад +2

    Er, Web Workers do not persist when you close the tab. Service Workers do, but if i recall they only activate when visiting the domain in which they're registered. I think your information is backwards. Also, Web Workers predate Service Workers.

    • @robbraxmantech
      @robbraxmantech  10 месяцев назад

      whatever you say. Now I program web workers of which service workers is a subset and it obviously has to keep running to do things like notifications.

    • @BinaryReader
      @BinaryReader 10 месяцев назад +1

      @@robbraxmantech It's not accurate to say one is a subset of the other either. Web Workers are merely a running thread (referred to as Isolate in V8) parented by an outer thread. In a browser, that outer thread is typically the UI thread for a page. If you terminate the outer thread (or close the page) the sub thread is immediately terminated (as would all threads be terminated in a threaded desktop application). This is different to Service Workers which are intended to "Service" multiple pages. Because they service multiple pages, the browser cannot naively terminate them when you close a tab (because another tab may be sharing that service). Service Workers are therefore executed "out of process" and linger when a tab is closed.
      Again, it is not accurate to say one is a subset of the other, the Page, Web Worker and Service Worker are all isolated processes, with the only distinction being that Web Workers run as in process threads, and Service Workers run out of process (and include Http intercept and Cache API)
      Sorry, I'm a Web Engineer with 25 years experience developing on the Web. So....yeah.

    • @josjedan-b8j
      @josjedan-b8j 10 месяцев назад

      so the guy made a video based of false information and the only guy that adresses the issue gets ignored and all other comments are paranoid npcs talking about living in woods?

    • @josjedan-b8j
      @josjedan-b8j 10 месяцев назад

      @@BinaryReader What are 'service workers'?e.g I've never seen a firefox process run after main process is closed

  • @marusholilac
    @marusholilac 11 месяцев назад +7

    A big shortcoming in all Windows OSs is the inability to make a shortcut to a website and to associate it with a particular browser. While I have 14 Windows computers, I choose to use Windows 7 the most, so that I can run some ancient software. I use Edge and Firefox, but the version of Edge that works on W7 is too old to handle some websites, so those I view with Firefox. I wish I could have desktop shortcuts that launched the correct browser instead of the default browser. This would also divide the personal information, as you suggest, among various browser, without my having to maintain and remember various sets of bookmarks/favorites.

    • @laboulesdebleu8335
      @laboulesdebleu8335 11 месяцев назад +2

      I too have long lamented the fact that Windows did not allow for a quick, easy & intuitive method for saving URLs with a browser preference. Knowing MS, even if they did provide this; as soon as we all discovered & became dependent on it, they'd break it or decontent in a future update. There are a couple of workarounds I've discovered. First is a method that will take a tiny bit of work up front for each shortcut, but will work as if MS had provided this feature all along. Simply create shortcuts to the desired browser, followed by a space and append the intended URL. Can name & iconize the shortcut as you wish. Should be able to quickly search up how to make a shortcut open with a specific browser.
      The second method is my favorite as it functions as a container of sorts instead of scattering shortcuts all over the place. That, and because most of the time when I have a preference other than my default browser, I'm also expecting to login to that site. Some (perhaps all) password managers will allow you to specify the program/browser that you wish to use when you launch an entry from your list. With command line switches, either method should allow you to optionally pop a new browser instance instead of a new tab in an already open browser, open in a private session/window etc.

    • @SuperCulverin
      @SuperCulverin 11 месяцев назад +4

      You can get around that by creating a shortcut to the browser of choice, but append the desired URL as an argument within the shortcut.

    • @marusholilac
      @marusholilac 11 месяцев назад

      @@laboulesdebleu8335 Thanks for the helpful suggestion (number one of your two), which I will be using for all my bookmarks which need my non-default browser. I don't like a cluttered desktop so my style is to create folders of shortcuts, like "GRAPHICS", "UTILITIES", "PRINT" (this would include InDesign, Acrobat, Wordpad, Notepad, Word, etc.), so I'll just have a folder, "FIREFOX BOOKMARKS". Since the contents of a folder are in text format and alphabetized, it will be like using any bookmark system. Wish I had posed this question years ago. . . .

    • @SpaceCadet4Jesus
      @SpaceCadet4Jesus 11 месяцев назад

      ​@@marusholilacyeah, you went years in the dark. 😢

    • @ibzman1393
      @ibzman1393 11 месяцев назад

      That can be done. Search online

  • @nickplays2022
    @nickplays2022 11 месяцев назад

    Fun fact: when you say "like button" in the video, the button below the video player is highlighted.

  • @anderslonn730
    @anderslonn730 11 месяцев назад +1

    Thank you very much, very informative and helpful 😮😊

  • @pauldaystar
    @pauldaystar 11 месяцев назад +1

    Rob, Big Thankyou from Alaska,

  • @Ardinia
    @Ardinia 11 месяцев назад +1

    speaking of partitioning of browsers, i would be curious to have you do a video on Qubes OS, and how it compartmentalizes everything across different workflows

  • @BurgerKingHarkinian
    @BurgerKingHarkinian 11 месяцев назад +4

    Ok, I normally think highly of your very critical view of a lot of privacy topics but HSTS? Yes, an outsider as well as the site itself may be able to find that you, at some point must've made a connection to a site at some point but from what I know, that's about it. As far as I am aware HSTS is more akin to a boolean flag, that forces your browser to use HTTPS instead of HTTP. What other data is stored on the client side that would make them identifiable in your opinion? If I am actually incorrect about this and you can give me some pointers, I would greatly appreciate it.

    • @robbraxmantech
      @robbraxmantech  11 месяцев назад +4

      All HSTS cookies can be scanned by an outsider so that set creates a unique signature.

  • @neliademelo6176
    @neliademelo6176 11 месяцев назад +5

    Hi Rob.
    Thank you so much for what you do.
    Teaching us to be aware, and how to protect.
    We appreciate you!

  • @ChaceBonanno
    @ChaceBonanno 11 месяцев назад +2

    Should take it further and do entirely different machines on different networks

  • @tenitabrown9086
    @tenitabrown9086 10 месяцев назад +2

    Are super cookies persistent in privacy tab, once the private tab is closed?

  • @X1Y0Z0
    @X1Y0Z0 10 месяцев назад +1

    Thanks 4 this info!❤❤❤

  • @yegfreethinker
    @yegfreethinker 11 месяцев назад

    finally someone calling out hsts bullshtit false security

  • @tomnoyb8301
    @tomnoyb8301 11 месяцев назад +2

    What do you think about Eric Prince's 'UP-phone?' Has hard-switches you used to like.
    Looks ridiculous next to your open-source apps and dual physical-sims though. Three times the price too.

    • @slickrick412
      @slickrick412 11 месяцев назад

      Wouldn't touch that with a 10 foot pole.

  • @xDMG15x
    @xDMG15x 11 месяцев назад +7

    I learned heaps from this video. I never considered that javascript might capture autofill data even if i delete it out of the input box before i submit.
    You mention watching youtube videos in a browser, i assume because you dont want to install the app, understandable. Is this the case with all the google services you use? Maps, search, gmail, docs etc?
    I’m forced to use google authenticator app for 3 different sites, is there a better option than having this app installed?

    • @robbraxmantech
      @robbraxmantech  11 месяцев назад +5

      De-Googled phones cannot run Google apps. Which is critical since the spyware is tied to a Googled phone and not removable

    • @xDMG15x
      @xDMG15x 11 месяцев назад +3

      Oh okay, that makes sense. Thanks.
      Can you use third party youtube apps on degoogled phones? Like vanced, newpipe or even the one Louis Rossmann is co-developing, Grayjay?

    • @robbraxmantech
      @robbraxmantech  11 месяцев назад +4

      yes works fine

  • @alvynTC
    @alvynTC 10 месяцев назад +1

    Hi Rob, regarding browser compartmentalization, how is behaving different profiles on Chrome / Edge / Brave etc? One for "logged in" stuf and "clean" or "one-time" for non logged stuf?

  • @TheRealMACA
    @TheRealMACA 10 месяцев назад +1

    appreciate your work, thx rob!

  • @jakobw135
    @jakobw135 2 месяца назад

    What do you think of the TEXT OLY Lenox browser called (I think), Lynx? Is it susceptible to a problems you mentioned?

  • @LouisLo0olz
    @LouisLo0olz 11 месяцев назад +2

    Why not using Firefox Containers to separate the browsing profiles?

  • @YordkarYordkar
    @YordkarYordkar 11 месяцев назад +1

    Could you please make a video about protecting your home router/network? And secure your browser for online banking.

  • @deemarty6618
    @deemarty6618 11 месяцев назад

    The tips ypu gave here will not be useful in 2024 but is thr best way for starters. Subbed.

  • @HashemMasoud
    @HashemMasoud 11 месяцев назад +1

    Another useful content. Many thanks!

  • @Shabang_coder
    @Shabang_coder 21 час назад

    I learn so much from you. Thank you.

  • @orsoncart802
    @orsoncart802 11 месяцев назад +2

    Thanks, Rob! 👍👍👍

  • @Acrimonious_Snake
    @Acrimonious_Snake 11 месяцев назад +1

    Windows 10 spies on user and makes screenshot at every mouse click. That is written in the license agreement.

  • @happycamper90596
    @happycamper90596 10 месяцев назад +2

    Privacy is a thing of the past .. Ai , Social media & Facial recognition , When they all connect its all over .. You cant beat the dod system. The Only way to beat it is not using it

  • @terminator2513
    @terminator2513 11 месяцев назад +1

    As always, you are our best protector❤🙏

  • @lmotaku
    @lmotaku 11 месяцев назад +1

    So if they have a super cookie already, and have been collecting data, what do you do? If you suddenly change your behavior it still has your information up to current year.

  • @ZulfiqarAli-gn5yz
    @ZulfiqarAli-gn5yz 11 месяцев назад +2

    Don't ISP's log all URLS regardless of which Browser is used, including "In Private" browsing?

    • @zhang-boyu
      @zhang-boyu 11 месяцев назад

      Yes. There always be ISP. You don't use VPN, and your ISP will get your HTTP headers (that's how GFW and other website restircitons across the world generally works). You use VPN, and your ISP will only(still) konw that you connect to somewhere, and ISP of VPN will know your URL. But (if use a dedicated mixture of plain, VPS providers, offf-the-shelf VPN providers, and Tor) you can minimize the possibility of any single organization get your full tracks on Internet.