The channel is of exceptional quality and is unfortunately not as well-known as it should be. It is one of the most honest and reliable channels on TH-cam. Thank you once again, Rob, for another excellent video.
@TonyGarrett-p1c if you really think it works that way you're not going to make it. Once you've done something your digital footprint is permanent. You can't just go online and run around doing things that you don't want people to know about, then delete your history and the whole thing is magically cleaned up. It doesn't work that way.
there is a Google container that supposedly prevents that - it makes all Google tabs have a red bar above them so you can see - but it prevents tracking automatically. You can also use a front-end for TH-cam and there are several of those. Google manages somehow to shut some down, but then others replace them. So, it can be done, but takes time and energy to keep up with. There are also a few alternatives to TH-cam and Rob has the best one listed in his show notes. When I put the name here, Google usually deletes my entire comment!
0:00 - 3:20 Yep, It's massive -- more than most of us can conceive of. Most people, including myself, have just surrendered to it all. But one day, I will just change home address, chuck old phone, and go live in the forest with a box of cash.
I'm going for boxes of seeds. A couple boxes of gold & rolls of copper too. A cashless society is something the powers that be are pushing for. I don't see enough people valuing, or even being aware of, the freedom cash allows for. Sad.
Many of the websites I use regularly, including financial ones, and also many websites I come across during general browsing, just don't work with VPNs. So it's really not a viable option.
I don't have a problem with that. You just establish a pattern and choose a location near you. Doing unusual patterns flag you. The purpose of a VPN is misdirect the IP address not appear like a criminal. I also stick to the same VPN server most of the time so the pattern is clear. Very minimal issues using this method.
What Rob brax is saying is true. I use a VPN 24/7 on all my devices. Browser Isolate and have dedicated browsers for Banking on your Android and Desktops. Login and then have the website remember your username. Keep the VPN location the closest city to you. Credit Unions don't care as much as big banks. I have had issues with Fidelity but I believe, without telling me, they whitelisted my account for VPNs. I had my account suspended twice and I complained enough to the point where I don't get suspended anymore. I told them I use VPNs for work.
Hi Rob, If I ran a nefarious three letter agency, I might scan the cell networks for phones lacking tracking identifiers, then correlate with surveillance cameras or simply stop and identify the person with the de-Googled phone. What are the odds of something like this happening. ???
A Three Letter Agency would need to subpoena such information from a mobile phone provider and it would probably have to be obtained on an individual basis through a court of law as part of a criminal investigation, they would not be given access to "the names and phone numbers of all people with de-Googled phones", for example. That is a completely different to the privacy scenario where your phone "naturally" leaks your personal data to be "snapped up" by the likes of Google, Apple and Faecesbook.
@adrianalexandrov7730 that depends on who the law enforcement thinks you are, how well you know the law and are able to present your knowledge & where you are.
I reloaded a new windows install on a desktop after messing with different versions of linux…. Windows didnt even ask for a purchase key. It RECOGNIZED MY COMPUTER based on my motherboard S/N….. that was actually kind of scary
Yes, it's because the Windows registration code is built into the PC's BIOS. Some PC manufacturers have been doing it as far back as Windows 8 in order to catch the people stupid enough to run Windows.
@@ТоварищКамрадовСоциалистКоммун its my gaming PC… i don’t care what anyone says. Linux is still not viable for top end games. I still run linux on my daily machine
@@terrydaktyllus1320 Incorrect. I can assure you it wasn’t in the bios. It recognizes the serial numbers of all your hardware and records them. I even changed a couple things and it still recognized enough of them.
@3M3 No, correct. It was in the BIOS. I first came across it on a Lenovo Y500 Ideapad that I purchased new some time around 2015. It came pre-installed with Windows 8 that I refused to use and installed Windows 7 on it. When I reinstalled Windows 8 on it a few years later to re-sell the laptop, no registration code was needed because it was clearly visible in the BIOS. Become better informed and don't make yourself look like an idiot.
Because buying a PC with Windows on it is you paying good money to have Microsoft "lease" the PC back to you under their control, and your monthly cost for that lease is your personal data. Do you not understand the simple concept that once you put Windows 10 or 11 on your PC, nothing on it is hidden from Microsoft any more?
@@terrydaktyllus1320 I have a separate machine that is "air-gapped" from the one I use for internet and email. This machine is used for other digital storage and such.
📝 Summary of Key Points: 📌 The video discusses 10 identifiers that can compromise your online privacy, including IP addresses, phone numbers, IMEI and MZ numbers, MAC addresses, CPU identifiers, OS license numbers, advertising IDs, cookie trackers, browser fingerprints, Google IDs, meta IDs, location tracking, and email addresses used for logins. 🧐 It emphasizes the importance of hiding these identifiers to maintain online anonymity, suggests solutions like using VPNs, dedicated phone numbers for 2FA, Google-free phones, virtual machines, and separate browsers for Google and meta usage. 💡 Additional Insights and Observations: 💬 Quotable Moments: "The internet is designed to track us... your goal if you want to be invisible on the Internet is to eliminate as many of these identifiers from your internet actions." 📊 Data and Statistics: The video highlights the risks associated with each identifier and provides practical solutions to mitigate these risks effectively. 🌐 References and Sources: The video mentions the importance of privacy and offers products like VPN services, Google-free phones, and email services to enhance online privacy. 📣 Concluding Remarks: The video provides valuable insights into protecting your online privacy by concealing various identifiers that can be used to track your activities. By implementing the suggested solutions and being mindful of the risks associated with each identifier, individuals can enhance their online anonymity and privacy. Generated using TalkBud
Supplemental suggestion: If practicing separation to keep things like google, etc, confined to just one browser, be aware of clicking video links in emails, twitter, etc, that will take you to youtube on the browser you are trying to keep free of google. Always copy a link and paste it into a browser reserved for this purpose or else the wrong browser might be opened.
True, I always have my browser set to erase everything when it closes and I use Brave and Firefox as my browsers. Any methods to keep yourself hidden when you go on the internet is a plus. TAILS is a great alternative OS too
....which VPN? they still have your payment details, right? VPNs do charge for their service, some more than others...or give discounts if these are sponsored. Still, there is a huge business selling your data....scam calling, selling invrstments, crypto.. etc
Of course they can! If the Government pressures them too, they’ll also do that. There aren’t enough layers of security one could apply without making the process time-consuming and probably dealing with slow internet speeds. I think running a personal NAS (Network Access Server) from your home network before using a VPN service may be better. For the more paranoid, running your operating system via a Virtual Machine software is better. VPN’s aren’t bad but TOR is better overall and you won’t need a VPN + TOR type stack. TOR alone is good enough. If you want internet anonymity, use multiple accounts (with their own email accounts), multiple personas. Just one Email can be attached to several social media accounts! You can split things up: 1 persona for personal internet activities (banking, shopping, etc). 1 persona for social media platforms (2 personas at most, split the tracking). These can be used to communicate with friends and family or anyone else. 1 persona as a backup to your personal internet activities. Keep your logon info in a text file which you save onto an external storage device like a USB flash drive. You can update the file in case you have to change passwords or something (which should be done every 60 days but really at least 2x a year). Copy & Paste your logon info into fields, don’t type it in case of key loggers! Don’t use the browser in-built password save feature. It’s a hassle but security is always a hassle on convenience! There’s probably other things to do but Multiple Persona strategy is what I learned in IT school (private institute) 21 years ago. Hasn’t failed me once. It does annoy my friends and family who have to sometimes remember a new persona but hey! Those small annoyances are worth it, big picture.
Last time I tried a VPN, all my services were telling me they detect a VPN so they wouldnt work, that was a couple years ago they have been be even more on it now
linux is certainly better, but you can just block in windows everything that you find unnecessary with a help from 3rd party utilities liker portmaster
@@ТоварищКамрадовСоциалистКоммун ...until Microsoft installs a Windows update that turns all of your settings off again. You should not use an OS that you cannot trust and have to constantly fight against.
@@terrydaktyllus1320 I don't trust Win platform completely, so I never do anything like banking on it. But I use it for many other purposes. And nope, new update does not reset a 3rd party firewall settings ) So I don't really care when edge gets an update and changes settings cause it's not my main browser
Higher anonymity needs a minimum of pentium 3 and an old CRT monitor. And the government readily tracks any/all connections, including to vpns, and will easily Middle Man Attack your connection to snoop on you, so if you want anonymity, internet isn't a great place to start.
it looks to me just like a half of a way. You need anyway to check if you are trackable (and how efficiently) by using something like browserleaks And let me guess that regardless of how many vivaldies or braves you use it's just simply not enough. If for any reason you need an ultimate privacy, you should rather use tor or mullvad it will probably be inconvenient and might even be unusable for many websites, but it's like it is
Mr Rob I don’t know how I should thank u for all the information advices warnings heads-ups u gave me and rest of the world. U have been such great source to understanding the internet, hacking, our global tech world. You are an angel. But pls I need 2 more helps from u. And u should know the severity of these two things I’m going to mention . We civilians are naked when it comes to global network, we’re exposed to be exploited by everyone. We don’t feel safe or secured at all. The first thing I would like u to bring up to subject and share more detailed light on the matter is protocol SS7 in cellphone signals. It’s not secured and therefore I would want u to give solution to its problem and how to avoid that. Phones can hacked remotely without anything by this protocol SS7. Second issue I have is how to prevent phones apple and android from using 2G and 3G networks. Last is how to stop using 2,4ghz WiFi signal and only implement 5ghz WiFi signal. Please rob I have faith in u…help us
@Rob Braxman when you say that the one exception for giving your "real" phone number for "2-factor-authentification is "for banks": Does "for banks" include services like Paypal, Klarna etc., or was it meant for "real banks" only?
❤ Not sure if you're able to help. I just woke up to a weird alarm that sounded like when you get an Amber alert. But there's nothing on my phone. I'm pretty sure my phone has been updated or installed with APK files and API files as well. It looks like I'm just wondering. What's the best file manager to use to possibly get rid of this without rooting my phone
IMEI and VPN are entirely unrelated. IMEI is accessed and visible because of Google/Apple apps running on the phone, irrespective of whether or not you use a VPN.
@@terrydaktyllus1320 I use my desktop for 99% of my internet. Currently I use a pi as a wireless router to get wifi from my tablet's hotspot.. and then connect the pi to the desktop over Ethernet. Since my desktop is 3 levels away from a direct connection to the internet, can they still get my IMEI? Can they get my tablet's IMEI, when I am surfing the web from my desktop? Would putting a VPN on the pi be useless, since my tablet is the first link to the internet? Can a VPN block IMEI requests? Can I make a software equivalent to uBlocks that will block or substitute IMEI requests and send the substitute?
@@WagonLoadsasking such questions means that you mix physical, infrastructure and software layers of communications. Simply saying, using VPN protects you from easy fingerprinting based on your IP. However there are many more )) if you want to move from just discussing to practical means, you should rather go to browserleaks or similar sites and check how effectively you can be tracked. You might be surprised how many fingerprints you make simply by clicking a website. If for any reason you need a good privacy, you indeed should use a worth-of-trust VPN, as well as tor or mullvad browser. IMEI as well as your real IP might be anyway available to big tech and three letter agencies, cause they have access literally to anything. Legally or not. Just ask Assange or Snowden
@@WagonLoads and if you are not that interested in digging that ground, a bunch of simple advices: 1. VPN I consider firstly as a security feature, not privacy. And you need it when you travel a lot and need to connect to internet using available free wifi and similar. Then it is a must. You need VPN if you need really a higher privacy/security, because you are an activist, politician, pop star, or just a target for some (cyber)criminals. 2. If you have iphone/android phone, then google/apple may have all information about you. You don't want it - don't use any of them ) 3. There is always a tradeoff between privacy and convenience. It's you and only you who knows what you need. People may give you advices, but all is up to you
Addressing is inherent to and required for end-to-end communication. The internet is not a broadcasting-based network. There is *_no way_* IP addresses were invented for the sole purpose of tracking.
Buy a dedicated device without a camera or microphone to prevent surreptitious voice and face ID. Never use your name, or any personally identifiable information on it. Never login to any personal accounts. They may know everything about the use of that machine, but they won't have a name to tie it to.* * Unless you do something to get the attention of a TLA, then they will use proximity tracking and data correlation to get you. Maybe only use it while wearing a facemask in public, after walking from an area without cameras. And hide all five traits that can be used to identify a person, like gait.
So if I use bluetooth earbuds while I am shopping, the store can read my bluetooth "id" and identify me by cross referencing that? Meaning I'd have to disable bt and used wired earbuds?
QUESTION: If I share internet from my own cellphone and someone login in Google from his cellphone, Wich IP Adresse will be tracked, mine or his or both? Good channel Thank you so much!
There is no such thing as total privacy. If you were born at a hospital, have attended school, had a job, filed taxes, had a doctors appointment, obtained a driver’s license, own a credit card, or hundreds of other considerations, your information is not really private.
there is always space for more privacy, and it can be less imaging a world in which some strange people watch where you put your fingerprint. They immediately look at it, add it to a database or check if you are already there. You are not informed how this information is used. In real world this happens only when some kind of crime is commited. In web world such fingerprint collection is a never ending process. Since this is considered like a kind of a new normality, you might want to ware gloves. Just to keep your privacy
Yes, a lot of that information has been around for a long time, but now it is all networked and accessible to anybody globally. Before the internet, that really wasn't the case.
MAY I CORRECT YOU SIR!!! Unless You Are a "Website" You Are Not Given A Static IP Address. As An Ordinery User Without a Dedicated Website , If I Switch My Modem Off/On or Restart It, I am Allocated a New IP Address. Most of Ordinary Internet Users Are On Dynamic IP Addresses. Eg. Your Phone Uses Dynamic IP, Its Identifier is Your Phone Number. Only If You Wish To Access Your Home Computer Across The Internet, Do You Need A Static IP Address. The Server Knows Where To Direct Your Connection. Most Internet Connections, Perhaps About 90% of Traffic, Is On Dynamic IP Addresses.
The IP address that your ISP gives you as part of DHCP is in a specific range of addresses allocated to that ISP - that will give any external viewer knowledge of what ISP you are using and probably a good idea as to what part of the world you're living in. Also a reverse DNS look up of the IP address will give them the name of your specific router on your ISP even if the router name is not tied specifically to your identity.
I'm waiting for Tesla to make a de-Google / non iOS phone 👍. A Tech writer recently was trying to spend living a week without touching anything related to Google, Microsoft, and Apple; and he said it was tough.
*PLEASE HELP*!Hi to all community people. My name is Mike and I forgot my p.w. for my Brax2 unit that I was one of the first buyers when it was created for us in 2022. Now I can't remember my p.w. to use my phone at a critical period of building my UAV,(delivery drone) buisness here in Quebec Canada. Please help me to hard reset this unit. I drained battery and memory info is not important.Thanks for any solution for this hard reset procedure. Mike
So your Canadian drone delivery service has a single point of failure as a dependency on ONE cellular phone? I think you need to go read up topics like "resilience" and "business continuity".
The problem is that few of us started out clean. It's nearly impossible to become a ghost once you've been visible. You can change your phone numbers and emails with various sites but they may retain the previous data in archives and thus be able to link your old numbers and emails to your new numbers and emails. I think the most effective solution is to create all new accounts and quit using the old accounts. The old data will still be there with the old accounts but after awhile it will become stale. You might need new friends too, lol. Algorithms might be able to link your old and new numbers by the changes in their uploaded contacts lists.
In Brazil its something easy and actually well estabilished in the politicians here. Its called "Laranjas", although it's something inmoral and illegal, and it's not only for internet but mostly used to evade taxes and money tracking.
It would be cool if you did a video on what Nathan Wade and Fani Willis to not be tracked by CellHawk. Nate The Lawyer has a decent video that runs down the evidence. Its a political hot button story but seems right up your alley and you could do it in a very neutral way.
I only have a Google account for utube here, phone is in the drawer, no simcard, no contacts are on this phone, on my personal degoogle phone I bought from Rob about 6 months ago, I do use Linux although I didn't think of VM, I'll try 👍
*I keep telling ppl stop using the like button. Social medias put together your personality* tape over your cameras. Remove your laptop and computers build in mic and webcam.
I cover the built-in webcams on my laptops with duct tape. Not savvy enough to know how to remove their mics. Apart from computers I don't own any smart devices, not even a phone (have landline phones).
I deleted Facebook 3 years ago and Twitter around 6 years ago. And I only get junk mail on gmail these days. If I could only go without Google phone and TH-cam.
How can you be invisible on the internet? Answer: Don't be on the internet. The point is that it's impossible. Any smart person already knows this. Even with a good VPN, you can never truly be invisible. You pay for an internet service provider, and every click, search, upload, and download goes through the internet and servers. Moving on.
Speak for yourself. You don't understand the danger in that type of thinking. The powers at be want us to think like that. My first disagreement with your statement is that you don't need to pay a service provider to have Internet. And even if you do there are ways to conceal your identity
@@rmh5102 - nothing is free, and nothing commercially valuable is free. You have to pay for internet, like most anything else, or you are nothing but a thief. The "powers that be" are above your mindset and pay grade. No matter what you do or what you perceive, there is NEVER total anonymity and invisibility. Period. It's impossible
Suppose a user wants to halt tons of garbage advertising and leave behind their connections to his particulars-- phone, cellphone, etc. Remember, most of your viewers only endure this high-tech abuse, and have no idea how to prevent. Do a newbie user-oriented segment, giving a few, clearly-stated rules, to have the most dramatic effect.
💥💥💥 YOU KEEP MENTIONING THAT VPN'S HELP WITH ANONYMITY BUT WITH AS MANY GOVERNMENT FRONT COMPANIES THESE DAYS, WHAT DO YOU THINK THE CHANCES ARE THAT TJE GOVERNMENT ACTUALLY OWN/ CONTROLS SOME IF MOT ALL VPN COMPANIES?? ALL THE STATE HAS TO DO IS SEND A SUBPOENA TO SAID VPN COMPANY AND MOST WILL JUST HAND OVER ANY INFORMATION THEY HAVE. NOW WHAT??
ProtonVPN is based in Switzerland and, if I recall correctly, isn't a part of the trifecta of countries that pass around subpoenas like candy. Regardless, if the VPN doesn't track you (from a technology standpoint), there is NOTHING to subpoena.
The best way is to throw your cell phone and any electronic device into the river or water and go to the primitive forest, otherwise, they know you. lol ^_^🤣🤣🤣Unfortunately, this is the fact.
Use mail, wear gloves, use sponge to seal envelope & stamp to avoid DNA transfer. Make letter on self destruct paper within 3 minutes. Use one time pads for encryption. Of course everybody does this.
I mean if they want to listen they can, I rarely use my phone. it sits there in airplane mode! I am going to add this that I am not using Google emails no more... I do use burner emails now and if something is compromised I just change the burner email! I use burner emails on Facebook and on youtube. they are harder to track and that's great!! I use a VPN and yes it's very trust worthy too not free. I pay my VPN with a prepaid card, this card is bought at the grocery story with cash so it's not tied to me.
Due to your internet history and social media reputation, the bank has decided to terminate your service and withhold your balance. I hope you understand.
coming soon to a country near you. supposedly, that was somewhat implied in the UN's latest document Pact for the Future signed by most countries in Sept. 2024. That document came in three parts and the worst part i.m.o. was the Global Digital Compact. The wording was vague, but left so much wiggle room for do-gooders to maneuver with. The words transformation was used repeatedly, the words "hate speech" and similar words were, too. Makes me think the digital ID for the internet (FIDO) is on its way. It was on its way anyway, but this document kinda hammers it home.
@@genkiferal7178 I found out banks have done so already, usually to anyone caught up as part of a protest, or notable figures. 19 US states have also had people accuse JPMorgan of bias or closing their accounts due to their beliefs as they don't align with their own (since banks now have political overreach,which is highly questionable). As for negative speech, london police get a lot of flack for wasting time with door to door visits purely when people post nonsense online and someone reports it for offense. The highlight was when they turned up at an ex policeman's door who knew more about the law than they did. Check the Harry Miller case on here. He had a 'crime non crime' recorded in which he had to pay to remove it
The channel is of exceptional quality and is unfortunately not as well-known as it should be. It is one of the most honest and reliable channels on TH-cam. Thank you once again, Rob, for another excellent video.
TH-cam is tracking me watching this video.
Delete your history maybe?
Tracked far before youtube
😂😂😂
@TonyGarrett-p1c if you really think it works that way you're not going to make it. Once you've done something your digital footprint is permanent. You can't just go online and run around doing things that you don't want people to know about, then delete your history and the whole thing is magically cleaned up. It doesn't work that way.
there is a Google container that supposedly prevents that - it makes all Google tabs have a red bar above them so you can see - but it prevents tracking automatically. You can also use a front-end for TH-cam and there are several of those. Google manages somehow to shut some down, but then others replace them. So, it can be done, but takes time and energy to keep up with. There are also a few alternatives to TH-cam and Rob has the best one listed in his show notes. When I put the name here, Google usually deletes my entire comment!
Great video, very informative! Always appreciate Rob's vids.💯
😂😂😂
Thankyou Rob. I haven't watched you for a couple of years but as always your clip was thought provoking, Informative and interesting. Cheers
Thank you for uploading. I look forward to watching this as I tidy up.
I do same, carry speaker about, but we are listening. I like long vids we don't need to watch.
The best security chanel! Thanks!
Great video. Cool dude. One of very best TH-cam channels of any subject.
This channel deserves every sub and view. great content!
Thank you for poviding such great and unique content.
0:00 - 3:20
Yep, It's massive -- more than most of us can conceive of. Most people, including myself, have just surrendered to it all. But one day, I will just change home address, chuck old phone, and go live in the forest with a box of cash.
I'm going for boxes of seeds. A couple boxes of gold & rolls of copper too. A cashless society is something the powers that be are pushing for. I don't see enough people valuing, or even being aware of, the freedom cash allows for. Sad.
Better make it a selfsufficient offgrid living IN a country where that is still allowed
Don't forget brass
Rob, you're awesome!! A great Patriot you are!!👍🇺🇸🇺🇸🇺🇸😉
Many of the websites I use regularly, including financial ones, and also many websites I come across during general browsing, just don't work with VPNs. So it's really not a viable option.
I don't have a problem with that. You just establish a pattern and choose a location near you. Doing unusual patterns flag you. The purpose of a VPN is misdirect the IP address not appear like a criminal. I also stick to the same VPN server most of the time so the pattern is clear. Very minimal issues using this method.
What Rob brax is saying is true. I use a VPN 24/7 on all my devices. Browser Isolate and have dedicated browsers for Banking on your Android and Desktops. Login and then have the website remember your username. Keep the VPN location the closest city to you. Credit Unions don't care as much as big banks.
I have had issues with Fidelity but I believe, without telling me, they whitelisted my account for VPNs. I had my account suspended twice and I complained enough to the point where I don't get suspended anymore. I told them I use VPNs for work.
Hi Rob, If I ran a nefarious three letter agency, I might scan the cell networks for phones lacking tracking identifiers, then correlate with surveillance cameras or simply stop and identify the person with the de-Googled phone. What are the odds of something like this happening. ???
A Three Letter Agency would need to subpoena such information from a mobile phone provider and it would probably have to be obtained on an individual basis through a court of law as part of a criminal investigation, they would not be given access to "the names and phone numbers of all people with de-Googled phones", for example.
That is a completely different to the privacy scenario where your phone "naturally" leaks your personal data to be "snapped up" by the likes of Google, Apple and Faecesbook.
You can't just stop and identify anyone you want. 4th ammendment.
@adrianalexandrov7730
that depends on who the law enforcement thinks you are, how well you know the law and are able to present your knowledge & where you are.
@@eeeckstrom yeah, sorry, by "you can't" I meant "it would be unlawful".
In practice, sure, you can.
If you can think of it so can they
Good job Rob.
Awesome information.
You are appreciated, Rob!
08:10 There are platforms providing SMS services, as they are regularly required for account registration.
Oh don't worry. I'm already invisible to women. Bada BING!
But next, LGBTQ+%@ will come get you. You can't really hide. 😅
@@4giveNever4get They're "coming to get you" to do what to you, precisely?
What about men?
👻👻👻👻👻👻👻👻👻👻👻👻
Hahahahahahaha
I reloaded a new windows install on a desktop after messing with different versions of linux…. Windows didnt even ask for a purchase key. It RECOGNIZED MY COMPUTER based on my motherboard S/N….. that was actually kind of scary
why mess with linux, why not to use it?
Yes, it's because the Windows registration code is built into the PC's BIOS. Some PC manufacturers have been doing it as far back as Windows 8 in order to catch the people stupid enough to run Windows.
@@ТоварищКамрадовСоциалистКоммун its my gaming PC… i don’t care what anyone says. Linux is still not viable for top end games.
I still run linux on my daily machine
@@terrydaktyllus1320 Incorrect. I can assure you it wasn’t in the bios. It recognizes the serial numbers of all your hardware and records them. I even changed a couple things and it still recognized enough of them.
@3M3 No, correct. It was in the BIOS. I first came across it on a Lenovo Y500 Ideapad that I purchased new some time around 2015. It came pre-installed with Windows 8 that I refused to use and installed Windows 7 on it. When I reinstalled Windows 8 on it a few years later to re-sell the laptop, no registration code was needed because it was clearly visible in the BIOS.
Become better informed and don't make yourself look like an idiot.
Tell us how Windows 11 is linked to the CPU ID
Because buying a PC with Windows on it is you paying good money to have Microsoft "lease" the PC back to you under their control, and your monthly cost for that lease is your personal data. Do you not understand the simple concept that once you put Windows 10 or 11 on your PC, nothing on it is hidden from Microsoft any more?
@@terrydaktyllus1320 I have a separate machine that is "air-gapped" from the one I use for internet and email. This machine is used for other digital storage and such.
look up windows TPM, Trusted Platform Module. It's connected to your hardware.
📝 Summary of Key Points:
📌 The video discusses 10 identifiers that can compromise your online privacy, including IP addresses, phone numbers, IMEI and MZ numbers, MAC addresses, CPU identifiers, OS license numbers, advertising IDs, cookie trackers, browser fingerprints, Google IDs, meta IDs, location tracking, and email addresses used for logins.
🧐 It emphasizes the importance of hiding these identifiers to maintain online anonymity, suggests solutions like using VPNs, dedicated phone numbers for 2FA, Google-free phones, virtual machines, and separate browsers for Google and meta usage.
💡 Additional Insights and Observations:
💬 Quotable Moments: "The internet is designed to track us... your goal if you want to be invisible on the Internet is to eliminate as many of these identifiers from your internet actions."
📊 Data and Statistics: The video highlights the risks associated with each identifier and provides practical solutions to mitigate these risks effectively.
🌐 References and Sources: The video mentions the importance of privacy and offers products like VPN services, Google-free phones, and email services to enhance online privacy.
📣 Concluding Remarks:
The video provides valuable insights into protecting your online privacy by concealing various identifiers that can be used to track your activities. By implementing the suggested solutions and being mindful of the risks associated with each identifier, individuals can enhance their online anonymity and privacy.
Generated using TalkBud
Thanks Brax
Supplemental suggestion: If practicing separation to keep things like google, etc, confined to just one browser, be aware of clicking video links in emails, twitter, etc, that will take you to youtube on the browser you are trying to keep free of google. Always copy a link and paste it into a browser reserved for this purpose or else the wrong browser might be opened.
True, I always have my browser set to erase everything when it closes and I use Brave and Firefox as my browsers. Any methods to keep yourself hidden when you go on the internet is a plus. TAILS is a great alternative OS too
Keep doing your thing Rob
TH-cam has recommended this to me to discourage me. I now have a brax2phone.
So how is it, compare to IPhone or Android?
@ I have no idea as I have not yet done anything to activate it. As a phone.
Rob we really miss your live streams on TH-cam
I don't because I never heard of him until today and now I am bored.
@@Omar_Zazzle
Nobody cares about your opinions Omar Plesnitral
I tried to download your program on Google play but it said my phone was not compatible because it was too new it's 4 years old am I being played
Hi Rob, in which video your telling also about the home video doorbells?
Having crome app gives everything away unless you have virtual system and good firewall, etc.
A firewall or virtualisation does not stop Chrome apps finding out who you are.
Great stuff thanks Rob.
....which VPN? they still have your payment details, right? VPNs do charge for their service, some more than others...or give discounts if these are sponsored. Still, there is a huge business selling your data....scam calling, selling invrstments, crypto.. etc
I've been wondering if VPN softwares/platforms can snif through your data traffic for valuable info if they want?
Of course they can! If the Government pressures them too, they’ll also do that.
There aren’t enough layers of security one could apply without making the process time-consuming and probably dealing with slow internet speeds.
I think running a personal NAS (Network Access Server) from your home network before using a VPN service may be better.
For the more paranoid, running your operating system via a Virtual Machine software is better.
VPN’s aren’t bad but TOR is better overall and you won’t need a VPN + TOR type stack. TOR alone is good enough.
If you want internet anonymity, use multiple accounts (with their own email accounts), multiple personas. Just one Email can be attached to several social media accounts!
You can split things up: 1 persona for personal internet activities (banking, shopping, etc).
1 persona for social media platforms (2 personas at most, split the tracking). These can be used to communicate with friends and family or anyone else.
1 persona as a backup to your personal internet activities.
Keep your logon info in a text file which you save onto an external storage device like a USB flash drive.
You can update the file in case you have to change passwords or something (which should be done every 60 days but really at least 2x a year).
Copy & Paste your logon info into fields, don’t type it in case of key loggers! Don’t use the browser in-built password save feature.
It’s a hassle but security is always a hassle on convenience! There’s probably other things to do but Multiple Persona strategy is what I learned in IT school (private institute) 21 years ago.
Hasn’t failed me once. It does annoy my friends and family who have to sometimes remember a new persona but hey! Those small annoyances are worth it, big picture.
Just going to say using a vpn is not a way to make your ip adddress invisible. Id recommend using a unix shell and create a custom proxy chain.
Last time I tried a VPN, all my services were telling me they detect a VPN so they wouldnt work, that was a couple years ago they have been be even more on it now
mine does too but the ip address they show isnt mine
Vpn always slows my connection on iphone so i dont use it...vpn on laptop or ipad doesnt slow connection
would using Linux be a better option or is that compromised too
yes, Linux is a better option, Windows is sending a lot of background data AFAIK mostly for advertising purpose.
linux is certainly better, but you can just block in windows everything that you find unnecessary with a help from 3rd party utilities liker portmaster
@@ТоварищКамрадовСоциалистКоммун ...until Microsoft installs a Windows update that turns all of your settings off again. You should not use an OS that you cannot trust and have to constantly fight against.
@@terrydaktyllus1320 I don't trust Win platform completely, so I never do anything like banking on it. But I use it for many other purposes.
And nope, new update does not reset a 3rd party firewall settings )
So I don't really care when edge gets an update and changes settings cause it's not my main browser
Higher anonymity needs a minimum of pentium 3 and an old CRT monitor. And the government readily tracks any/all connections, including to vpns, and will easily Middle Man Attack your connection to snoop on you, so if you want anonymity, internet isn't a great place to start.
15:45 who tf is zipping their coat up & whispering? I can’t hear wtf you’re saying. 😂
What public databases?? 2:43
Does the answer involve moving to Antarctica ?
How about firefox containers? Or use differnt users in Brave, Vivaldi, Chorme? One user for Google, one for FB, one for news and so on.
it looks to me just like a half of a way. You need anyway to check if you are trackable (and how efficiently) by using something like browserleaks
And let me guess that regardless of how many vivaldies or braves you use it's just simply not enough.
If for any reason you need an ultimate privacy, you should rather use tor or mullvad
it will probably be inconvenient and might even be unusable for many websites, but it's like it is
Mr Rob I don’t know how I should thank u for all the information advices warnings heads-ups u gave me and rest of the world. U have been such great source to understanding the internet, hacking, our global tech world. You are an angel. But pls I need 2 more helps from u. And u should know the severity of these two things I’m going to mention . We civilians are naked when it comes to global network, we’re exposed to be exploited by everyone. We don’t feel safe or secured at all. The first thing I would like u to bring up to subject and share more detailed light on the matter is protocol SS7 in cellphone signals. It’s not secured and therefore I would want u to give solution to its problem and how to avoid that. Phones can hacked remotely without anything by this protocol SS7.
Second issue I have is how to prevent phones apple and android from using 2G and 3G networks.
Last is how to stop using 2,4ghz WiFi signal and only implement 5ghz WiFi signal.
Please rob I have faith in u…help us
Many videos on this. Consider the various non-SIM communication methods like the Brax Virtual Phone I have discussed in many videos
@Rob Braxman
when you say that the one exception for giving your "real" phone number for "2-factor-authentification is "for banks":
Does "for banks" include services like Paypal, Klarna etc., or was it meant for "real banks" only?
❤ Not sure if you're able to help. I just woke up to a weird alarm that sounded like when you get an Amber alert. But there's nothing on my phone. I'm pretty sure my phone has been updated or installed with APK files and API files as well. It looks like I'm just wondering. What's the best file manager to use to possibly get rid of this without rooting my phone
I know you can use a pi as a VPN, but can it replace your IMEI
with a random or non-real one?
IMEI and VPN are entirely unrelated. IMEI is accessed and visible because of Google/Apple apps running on the phone, irrespective of whether or not you use a VPN.
@@terrydaktyllus1320 I use my desktop for 99% of my internet.
Currently I use a pi as a wireless router to get wifi from my tablet's hotspot.. and then connect the pi to the desktop over Ethernet.
Since my desktop is 3 levels away from a direct connection to the internet, can they still get my IMEI?
Can they get my tablet's IMEI, when I am surfing the web from my desktop?
Would putting a VPN on the pi be useless, since my tablet is the first link to the internet?
Can a VPN block IMEI requests?
Can I make a software equivalent to uBlocks that will block or substitute IMEI requests and send the substitute?
@@WagonLoadsasking such questions means that you mix physical, infrastructure and software layers of communications. Simply saying, using VPN protects you from easy fingerprinting based on your IP. However there are many more ))
if you want to move from just discussing to practical means, you should rather go to browserleaks or similar sites and check how effectively you can be tracked.
You might be surprised how many fingerprints you make simply by clicking a website.
If for any reason you need a good privacy, you indeed should use a worth-of-trust VPN, as well as tor or mullvad browser.
IMEI as well as your real IP might be anyway available to big tech and three letter agencies, cause they have access literally to anything. Legally or not. Just ask Assange or Snowden
@@WagonLoads and if you are not that interested in digging that ground, a bunch of simple advices:
1. VPN I consider firstly as a security feature, not privacy. And you need it when you travel a lot and need to connect to internet using available free wifi and similar. Then it is a must. You need VPN if you need really a higher privacy/security, because you are an activist, politician, pop star, or just a target for some (cyber)criminals.
2. If you have iphone/android phone, then google/apple may have all information about you. You don't want it - don't use any of them )
3. There is always a tradeoff between privacy and convenience. It's you and only you who knows what you need. People may give you advices, but all is up to you
YES I wan't to be a ghost!!! Please help us!
Addressing is inherent to and required for end-to-end communication. The internet is not a broadcasting-based network.
There is *_no way_* IP addresses were invented for the sole purpose of tracking.
no real way to go online being private, darpa has created most devices.
Buy a dedicated device without a camera or microphone to prevent surreptitious voice and face ID. Never use your name, or any personally identifiable information on it. Never login to any personal accounts. They may know everything about the use of that machine, but they won't have a name to tie it to.*
* Unless you do something to get the attention of a TLA, then they will use proximity tracking and data correlation to get you. Maybe only use it while wearing a facemask in public, after walking from an area without cameras. And hide all five traits that can be used to identify a person, like gait.
is rhodes your last name? lol mine is rhude. too funny, tks for ideas.@@jonathanrhodes6180
@@jonathanrhodes6180what is TLA?
So if I use bluetooth earbuds while I am shopping, the store can read my bluetooth "id" and identify me by cross referencing that?
Meaning I'd have to disable bt and used wired earbuds?
Yes, that's the way to go
More worried about the WHO enforcing sweeping pandemic laws. That organization needs to be abolished
Trumpian ding-a-ling alert.
italians posted a parody to the us president. And it's a very popular video, has a lot of reaction to it
WHO TF do the WHO think they are to rule over people?
Please do a video on two factor identification when cellular network is down like ATT is right now.
Why do you believe you only need to run 2FA on certain kinds of networks, presumably (public) wifi? Why would you not just run it everywhere?
QUESTION: If I share internet from my own cellphone and someone login in Google from his cellphone, Wich IP Adresse will be tracked, mine or his or both? Good channel Thank you so much!
same IP address but cell data is fine.
if I use phone emulator on windows with VPN can they see my PC?
There is no such thing as total privacy. If you were born at a hospital, have attended school, had a job, filed taxes, had a doctors appointment, obtained a driver’s license, own a credit card, or hundreds of other considerations, your information is not really private.
there is always space for more privacy, and it can be less
imaging a world in which some strange people watch where you put your fingerprint. They immediately look at it, add it to a database or check if you are already there. You are not informed how this information is used.
In real world this happens only when some kind of crime is commited.
In web world such fingerprint collection is a never ending process. Since this is considered like a kind of a new normality, you might want to ware gloves. Just to keep your privacy
Yes, a lot of that information has been around for a long time, but now it is all networked and accessible to anybody globally. Before the internet, that really wasn't the case.
That's not the point, Derrick....
They got your DNA.
@@skyhso can you change your dna? Lol 😂
Is STARTPAGE a good alternative?
I have a very good relationship with this company. It is a very good alternative.
Hi, braxme,
Did you find the 4G phone, for me?
I don’t count on VPN’s . SWIM used a couple different ones to get some movies, Google still knew which ip it came from
MAY I CORRECT YOU SIR!!!
Unless You Are a "Website" You Are Not Given A Static IP Address.
As An Ordinery User Without a Dedicated Website , If I Switch My Modem Off/On or Restart It, I am Allocated a New IP Address. Most of Ordinary Internet Users Are On Dynamic IP Addresses.
Eg. Your Phone Uses Dynamic IP, Its Identifier is Your Phone Number.
Only If You Wish To Access Your Home Computer Across The Internet, Do You Need A Static IP Address. The Server Knows Where To Direct Your Connection.
Most Internet Connections, Perhaps About 90% of Traffic, Is On Dynamic IP Addresses.
If you are on DSL that is not correct. I am not on static. But they are too lazy to change the IP Address and I am on Spectrum
The IP address that your ISP gives you as part of DHCP is in a specific range of addresses allocated to that ISP - that will give any external viewer knowledge of what ISP you are using and probably a good idea as to what part of the world you're living in.
Also a reverse DNS look up of the IP address will give them the name of your specific router on your ISP even if the router name is not tied specifically to your identity.
Obviously
What about the serial number of you computer?
What does he mean by "inner net" and "inner web"?
I'm waiting for Tesla to make a de-Google / non iOS phone 👍. A Tech writer recently was trying to spend living a week without touching anything related to Google, Microsoft, and Apple; and he said it was tough.
yeah, its not like tesla would track you just the same…they already accept government funding yaknow
By far, Google is the hardest to get rid of.
*PLEASE HELP*!Hi to all community people. My name is Mike and I forgot my p.w. for my Brax2 unit that I was one of the first buyers when it was created for us in 2022. Now I can't remember my p.w. to use my phone at a critical period of building my UAV,(delivery drone) buisness here in Quebec Canada. Please help me to hard reset this unit. I drained battery and memory info is not important.Thanks for any solution for this hard reset procedure. Mike
So your Canadian drone delivery service has a single point of failure as a dependency on ONE cellular phone? I think you need to go read up topics like "resilience" and "business continuity".
trying to un-invisible myself because apparently jobs cannot find the right version of “me”
Whatever happened with the pinephone?
I have a pine phone. It's a great start.
Many sites also reject VPN IP addresses. Yes, even his.
The problem is that few of us started out clean. It's nearly impossible to become a ghost once you've been visible. You can change your phone numbers and emails with various sites but they may retain the previous data in archives and thus be able to link your old numbers and emails to your new numbers and emails. I think the most effective solution is to create all new accounts and quit using the old accounts. The old data will still be there with the old accounts but after awhile it will become stale. You might need new friends too, lol. Algorithms might be able to link your old and new numbers by the changes in their uploaded contacts lists.
I FORGOT MY P.W.AND NEED HELP TO HARD RESET MY BRAX2 PHONE TO IT'S ORIGINAL FACTORY SETTINGS
..subscribed. here to help Rob about privacy -- for now, 😇..
He doesn't need your help, you need his help.
great vid brother!
In Brazil its something easy and actually well estabilished in the politicians here. Its called "Laranjas", although it's something inmoral and illegal, and it's not only for internet but mostly used to evade taxes and money tracking.
***Would it make sense to get New Internet carrier (to get new IP addresses???
Your IP address probably changes every 24 hours anyway due to your ISP using DHCP.
And they can do anything. I have absolutely nothing and neither does my family. Im old and no trafficking for me.
What an odd thing to say
Thanks
best to have Linux as Base Os with windows running in a KVM VM
Is it sure VirtualBox, of all VM solutions, isn't somewhat oracular?
Faraday bags/cages are a necessity now.
It would be cool if you did a video on what Nathan Wade and Fani Willis to not be tracked by CellHawk. Nate The Lawyer has a decent video that runs down the evidence. Its a political hot button story but seems right up your alley and you could do it in a very neutral way.
Watching that story I couldn't help but think "what would Rob do".
Thanks, I will follow your tips after buying a new laptop and mobile phone 😂
I only have a Google account for utube here, phone is in the drawer, no simcard, no contacts are on this phone, on my personal degoogle phone I bought from Rob about 6 months ago, I do use Linux although I didn't think of VM, I'll try 👍
But the main threat is Intel ME
I am a sting operation by myself. I caught a lot of big fishy.
BIG DATA DADDY
Google allows an alias using the + sign
*I keep telling ppl stop using the like button. Social medias put together your personality* tape over your cameras. Remove your laptop and computers build in mic and webcam.
I cover the built-in webcams on my laptops with duct tape. Not savvy enough to know how to remove their mics. Apart from computers I don't own any smart devices, not even a phone (have landline phones).
Sir can you please add big captions in your video..... It would look great....
If you give him your home address he will also come over and fluff up the cushions on Your Majesty's chair and massage Your Highness' feet too.
Now I am becoming even more paranoid.
I deleted Facebook 3 years ago and Twitter around 6 years ago. And I only get junk mail on gmail these days. If I could only go without Google phone and TH-cam.
I added fb to the block list in portmaster.
Now personally for me fb does not exist any more.
Niiiiice
Same for me
How to be invisible on the Internet: Make dozens of TH-cam videos.
...says a person that seems to using his real name on TH-cam. Oh, the irony.
being anonymous not equal to privacy
privacy is not equal to security
And as a rule, the title of the video is 4 clicks, not for "invisibility" ))
@@terrydaktyllus1320 I have no concerns about it, nor am I telling ppl how to"be invisible on the internet".
@urke7675 Clearly, Steve Burke, you are most visible... or is that "Mr. Kettle"?
How to stop stingray
I'm already a ghost. Even my name says so, as "duch" means ghost in the slavic languages.
Thanks . The first clue I needed to find you, lol. best2u Boo.
Zdravo!
Yes! Just the clue I needed to identify you, Thx Boo
@@overallgreatidea6433 good luck finding me 😉 PS I'm not a Slav, I just learned some of their languages 🥟🥟🍸🧏♂️🧏♀️🙅♀️🤦🍸🍸🍻🥟🥟
Yes, as long as when you access TH-cam you don't do it from a Google Android phone or iPhone - otherwise they know exactly who you are.
great tips
Too much time online could be the cause, perhaps. MAYBE, we should all give up the internet, atleast, for awhile. Js
How can you be invisible on the internet? Answer: Don't be on the internet. The point is that it's impossible. Any smart person already knows this. Even with a good VPN, you can never truly be invisible. You pay for an internet service provider, and every click, search, upload, and download goes through the internet and servers. Moving on.
Speak for yourself. You don't understand the danger in that type of thinking. The powers at be want us to think like that. My first disagreement with your statement is that you don't need to pay a service provider to have Internet. And even if you do there are ways to conceal your identity
@@rmh5102 - nothing is free, and nothing commercially valuable is free. You have to pay for internet, like most anything else, or you are nothing but a thief. The "powers that be" are above your mindset and pay grade. No matter what you do or what you perceive, there is NEVER total anonymity and invisibility. Period. It's impossible
VPN'S are not PRIVATE
False. Even if you are off the internet, at least some of your info is online.
@@spartanchuckles8743 -not false in how I was saying it. That was my point. You would have never even been onto the internet to begin with.
Suppose a user wants to halt tons of garbage advertising and leave behind their connections to his particulars-- phone, cellphone, etc.
Remember, most of your viewers only endure this high-tech abuse, and have no idea how to prevent.
Do a newbie user-oriented segment, giving a few, clearly-stated rules, to have the most dramatic effect.
💥💥💥 YOU KEEP MENTIONING THAT VPN'S HELP WITH ANONYMITY BUT WITH AS MANY GOVERNMENT FRONT COMPANIES THESE DAYS, WHAT DO YOU THINK THE CHANCES ARE THAT TJE GOVERNMENT ACTUALLY OWN/ CONTROLS SOME IF MOT ALL VPN COMPANIES?? ALL THE STATE HAS TO DO IS SEND A SUBPOENA TO SAID VPN COMPANY AND MOST WILL JUST HAND OVER ANY INFORMATION THEY HAVE. NOW WHAT??
ProtonVPN is based in Switzerland and, if I recall correctly, isn't a part of the trifecta of countries that pass around subpoenas like candy.
Regardless, if the VPN doesn't track you (from a technology standpoint), there is NOTHING to subpoena.
The best companies don't keep records and the O.S. is stored/ran on temporary ram.
They'll get what they want and however they choose. I believe they can get through anything and do anything too
I suspect they might be behind crypto currency also.
I am using a self-host vpn, is this good?
The best way is to throw your cell phone and any electronic device into the river or water and go to the primitive forest, otherwise, they know you. lol ^_^🤣🤣🤣Unfortunately, this is the fact.
Use mail, wear gloves, use sponge to seal envelope & stamp to avoid DNA transfer. Make letter on self destruct paper within 3 minutes. Use one time pads for encryption. Of course everybody does this.
I mean if they want to listen they can, I rarely use my phone. it sits there in airplane mode! I am going to add this that I am not using Google emails no more... I do use burner emails now and if something is compromised I just change the burner email! I use burner emails on Facebook and on youtube. they are harder to track and that's great!! I use a VPN and yes it's very trust worthy too not free. I pay my VPN with a prepaid card, this card is bought at the grocery story with cash so it's not tied to me.
Due to your internet history and social media reputation, the bank has decided to terminate your service and withhold your balance. I hope you understand.
coming soon to a country near you.
supposedly, that was somewhat implied in the UN's latest document Pact for the Future signed by most countries in Sept. 2024. That document came in three parts and the worst part i.m.o. was the Global Digital Compact. The wording was vague, but left so much wiggle room for do-gooders to maneuver with. The words transformation was used repeatedly, the words "hate speech" and similar words were, too. Makes me think the digital ID for the internet (FIDO) is on its way. It was on its way anyway, but this document kinda hammers it home.
@@genkiferal7178 I found out banks have done so already, usually to anyone caught up as part of a protest, or notable figures. 19 US states have also had people accuse JPMorgan of bias or closing their accounts due to their beliefs as they don't align with their own (since banks now have political overreach,which is highly questionable). As for negative speech, london police get a lot of flack for wasting time with door to door visits purely when people post nonsense online and someone reports it for offense. The highlight was when they turned up at an ex policeman's door who knew more about the law than they did. Check the Harry Miller case on here. He had a 'crime non crime' recorded in which he had to pay to remove it
For 1 ppl can start by stop using the like button. It cant figure out your personality.
@@milademjayy They could always use an emoji to clear things up. I usually add 😐
Do not use the internet .. - 😂😂
Note: tor has weaknesses that police can identify you
I was wondering how Walmart knew i was there 🤦🏻♀️
Throw the phone away- easy