Mialisus it was originally created by them but now it is independently run, it is apparent they don’t have a backdoor because of all the work they have to do to catch people who commit crimes on tor.
@@kyy. on who’s authority are they considered trusted? Open source is good because you yourself can review the code. Which obviously necessitates knowing what you’re looking at.
@@notaboutit3565 it is a lot hard to lie as a community than one person lying. multiple credible sources are using this software every day to circumvent censorship and countless of drug markets are using this. there wouldnt be this much going on had they been inserting malicious code
Well im fked regardless, prior head injury so cant remember the shit to begin with. Theyll have the damn rooter coming out my mouth before i remember which password i used.
@@ThirtytwoJ you can borrow my phrase for that CRS as in can't remember shit, I had a brain hemorrhage stroke May 25 2021 left me with a sensation problem with the right hand! I get to drop a can of soda or something else at least once a day! Then I had a regular one in April of 22 affected my speech for hours but it looks like if I'm stressed or panicking I CRS, who knows why! Hope you get better every day ❣️
11:50 Actually, TH-cam does support stepping through a video frame-by-frame. I do this a lot. While paused, you can use the '.' and ',' keys to go backwards and forwards by 1 frame at a time.
Yes I also knew this... however being a "power user" TH-cam since basically its creation... I often watch videos at faster speeds to peruse the content faster. I really wish there was a super easy way to watch videos essentially as fast as you would like to watch them. X2 isnt fast enough sometimes. ( I realize there are some workarounds just not really convenient)
I figured this out s long time ago (I swear it was letters though) but couldn't figure bit out again. TY. hopefully odysee copies (they do for a few shortcuts)
i am extremely interested in the hypothetical longer video. the longer and more detailed the better. this is something i've been wanting to commit to for a long time, but i don't want to waste my time by only partly securing my privacy. good channel btw
Well, if you are one of the people who "have nothing to hide", even just doing it partly to normalize using this software and to reduce your data footprint is still useful. Be as thorough as you have time to be.
What counts as "highly illegal" can and does change at the whim of the parasitic ruling class and their puppets and their rabid attack dogs(like "AFT") all the time, and what people call "law" these days is rarely enforced equally. representatives of the parasitic ruling class and their puppets can and do get away with almost anything. Allegedly you have freedom of speech in most EU countries, yet people are arrested for expressing their opinions on the internet all the time.
Every government is authoritarian. Those Mike's, Tom's and Josh's who live in western countries should strive to do the same as those Mei's and Vadim's.
Man, how do you manage to up a new video for this channel every single day? I mean, every day there's a complete new video with more than 10 minutes where you went in some topic with some dept. You don't just post crap to fill up your channel, new quality stuff is up here every day, it's a really great work to see being done even for a popular channel. I'm loving this channel so hard, you deserve more for what you do.
LOL previous comment: Clearly huge shout-out for posting that content : it's becoming critical and everyone is concerned with what's coming 🔮 I've posted huge comments😅(sorry for that ) but related to the topic of that video as i have some concerns regarding, possibly prior (cleaning footprints years piles of linked datas from years of bad practices which i believe is a good 90%+ of regular internet users. And i would like to know if it's worth the time and investment in this quest (check my comment) ..... THEN ONLY APPLY EXCELLENT ADVISES SHARED ON THAT VIDEO 👍🏻
Hahaha something like a skit Something tells me there is some spook in the government that upon the right set of circumstances this suave guy just knocks on the door and says "hi I am Mr. So-and-so and I am your cybersecurity consultant." He politely asks where each of your computers and devices are, past and present, then he unceremoniously Chuck's them into the f**k it bucket.
Definitly make a more in depth video. And try your hardest to make it normie friendly because they're the ones that really need to hear this. I think you do a good job with that normally, but since normies actually seem to care about privacy they have a much better chance watching it all the way through if you give them a padded safe space to explain that they're still being spied on even with brave and nord vpn.
@@warriorbuilds3145 buy an old cpu that doesn't have the Intel or AMD memory management systems. That's one of the main reasons people like older thinkpads. Fair warning though, in order to do this requires libre booting which isn't easy and can brick your systen. Plus no one really knows if the cpu is just a hardware backdoor or actually communicates over the internet, either way linux cuts down on spying by 90% vs windows with the CPU being the only concern. Welcome to the bs of c-sec.
I love these deep dive into maximizing security. It would help those that care about not being tracked a lot. Not many internet resources can describe them as good as your video (either being too technical or too simplified to the point that it only scratches the surface, tell you to use this use that, no reason given)
This shit is so basic, yet so essential (and still many people don't know it). This video should be required viewing for every single human being before they are allowed to use the internet.
@@franatrturcech8484 yeah, this is actually true. Google are using an advanced tracking method through which they can tell exactly where your fingers are on your keyboard by analysing your keypresses
I feel like I'd only really need to do all of these things if my profession really required it, for example if I was a higher up CIA agent or something. I think some of these could be pretty useful for most people though, so I'll keep them in mind. Thanks
@@itsthemightyd2339 I do a few things to safeguard some of my privacy like using Firefox and DuckDuckGo, but even then I don't really have a choice but to use Android on my phone (for a few reasons) and Windows as my main OS (for school), and those operating systems definitely spy on you. I wouldn't really do something just for some extra privacy if it seriously impairs my everyday computing experience, especially when data collection is inevitable in my scenario.
would you feel comfortable with somone watching you and following you around every single moment of every day. listening to every conversation. just watching you. all the time. then using this info to stop you from traveling. or taking a loan. or having children. perhaps selling that info to your employer so that they can find a reason to fire you. ??
Securing your hardware and your Operating System are a bigger priority. Also securing your location because if you don't want to be tracked you shouldn't do it from your home address or from a place with video surveillance.
Watching videos like this so i get paranoid and stop using technology so much so that i can remove myself from behind a screen so often. Im playing the long game
Na. Even normies like some of my friends' 60 year old dads have atleast 4. I don't think they did it for privacy but still, I personally don't know a single person with just one. Everyone has atleast 1 work and 1 personal. But that is as far as it goes.
I only have one email account for everything, but personnally it's because I made it when i was 9 so I could play games and waatch minecraft lets plays, it is very usefool and I always feel safe knowing someone always here for me
If only if it was possible nowadays. We are just gonna wait for him or other content creators to reintroduce and update the topic in general. I suppose.
The reason behind the tracking data is not to understand what user XY is doing but to understand what people do in general in a specific group. Such data might help in noble cases, but ofc can be used negatively, remember IBM barcodes in germany.
Let's be real- if the feds or LEO's want access to your device, they 100% have back doors into every single device out there. I operate under the assumption that NOTHING digital is even remotely safe or private, and act accordingly. If I do things I don't want the government knowing about, I leave my phone at home. If I'm having a conversation I don't want recorded or monitored, I leave my phone in the vehicle or at home. I don't send messages on any digital platform that I wouldn't want law enforcement seeing, and I assume they see and read everything I send. I don't use digital payments of any kind for anything I don't want the world to be able to see. You cannot trust anything digital or anything with a microphone, camera, or connective abilities.
I love those security autism video, it always kick me in the butt to up my security game. I'm one of those normie that use the same google account for everything. Instead of using a email service, I'll go more the luke smith way and make a email server for myself.
@@nictou he’s someone who has the technical skill and knowledge to make an email server, but he’s a normie in the sense he didn’t give a shit about making multiple email adresses
rolling your own mail server is not the most secure solution. You're almost certainly not good enough to make it secure if you don't do it often and aren't otherwise a talented engineer. Use a more secure service instead.
might be late, but there's easily accessible sites with common numbers for sms confirming services. the site has like dozens of numbers for the main countries for free. the one i used had a sms history, though, so maybe -1 for pivacy. but it does get the job done for unimportant, annoying stuff.
Never understood the whole password manager deal. I don't trust such sensitive info in the hands of a manager that could get comprimised. Keeping your passwords on paper in a safe (maybe one that's fireproof) or somewhere you know is safe, in my book, is much safer than a password manager.
There are password managers you download and aren’t connected to the internet at all, just if you lost access to that device you can’t get the passwords back for a new device.
The sherlock holmes 2 method of random bs in random book is looking better n better. Problem is post head injury i cant even remember the password so how the fk am i gonna remember the cipher?
I have long had a desire to create a separate device for perusing the web as Anonymous as possible... While I am relatively tech-savvy. I am not certain that I would have had the foresight to avoid accounts created on a Normie setup... It is sort of self-explanatory when you think of it... essentially you are creating another identity tree. Sometimes people get too hung up on the idea of being completely Anonymous when in reality you are trying to keep "identity trees" separate.
An important step to keeping vpns private is to install an outbound firewall so that your gmail isn’t syncing over the vpn connection every 5 seconds. This is extra important if you use Windows.
if you have time and resources, also try to gather a few books that might be deemed as "prohibited knowledge" in a not so far future. godspeed and be safe, hard times are coming...
@@itsdokko2990 prohibited? man amazon literally has books on whatever knowledge you seek, the anarchist cookbook is an example (only one know off the top of my head) and several others. Hell, with the info amazon gets, you'll probably get into an amazon recommendations rabbit hole.
@@randomdude4110 The anarchist cookbook is ass. A lot of the stuff is either wrong at a fundamental level or is plain dangerous to follow. The archives of oldschool chemistry forums are OSHA compliant in comparison.
Nice video, but my method is much simpler: First, determine where you have a laptop for a desktop (I will assume you are using a desktop). Next, open it up and locate your network adapter. Step three is simple, just rip it out.
Great video. I use secure email services with end to end encryption built in, in addition to secure, end-to-end encrypted, open source anonymization relay services. Never reuse an email or phone number, or any type of login across platforms.
People will learn real soon when reusing the same password. lol Honestly I've done it in the past, and while I didn't get hacked, once my info showed up in HaveIBeenPwned, that taught me a good lesson.
Hey Outlaw, great video again. I wanted to know what are your thoughts on Telegram and the level of security since I've been using it for a while and I really like it. Your videos have been really helpful so far and I find the content of your channel to be really important for the community, so thank you for what you do.
To add to that: "Open source is always good", not always the case. In case of Bitwarden, the frontend software is open source, but your data is stored in a third party cloud service, called Microsoft Azure.
maybe a better saying is "If its a free product offered by a for-profit business/organization, your likely the product" KeepassXC is a good password manager because its 1. open source 2. localized to your computer in an encrypted database. 3. offers 2 factor authentication in the form of a physical qb key or a secondary authentication file kept on a usb stick. Cloud based password managers are very convinent, but always come with the downside of your info being hosted on a remote server that is a potential hacking target.
i made my own password manager with my own encryption, i know people say don't do it. but i trust myself and my coding skills enough to believe its pretty difficult to break
@Lucas Zhu ok. Well I did. It isn't that difficult to make a password manager. I mean the encryption was pretty difficult. Plus I'm not even sure if it is even close to being secure
the reason why most people wont show their internet history to their closest friends but dont care if a corporation knows it simply is because the corpo doesnt judge them. imagine your ISP or google would be like EWWWWWWWWWWWWWWWWWW whenever you look for hentai. you suddenly would care a lot faster for internet privacy
@miserable excuse for a human being I think so? idk I always go incognito to not have a search history (on my phone) in the first place. my ISP obviously does and I hope they are disgusted xd
So true, when I wasn't a linux user and didn't care about privacy I always thought to myself "well yeah google knows I did that but what are they gonna do, judge me?"
might as well write them down on a notebook unless your 'threat profile' includes actually being picked up by the alphabet guys, in that case idk maybe keep the notebook in a small case that includes a bottle of lighter fluid and a box of matches or something. Or just memorise every single password by using a spaced repetition app like anki
14:30 but running an alternative plugin changes your browser footprint and makes you easier to identify, wouldn't you just use the "safer" options in preferences to achieve the same effect?
I suppose the only way you could be actually Anonymous is to not exist in the first place. The main takeaway is to create different online "identity trees" A key part of that is not linking or branching your various "identities.
11:55 You CAN move frame by frame by using keyboard shortcuts (comma and period), though. the buffering is also and easy fix by just not mashing either keys. DDG May be privacy respecting, but goddamn it's as biased as Google (just on the other spectrum). Sometimes I can't find news on DDG that I could on Google. Maybe it's because I don't live in the US.
Should we sacrifice ALL of our comfort for the sake of anonymity? One could use a password manager like bitwarden, for example, and have balance. I use keepass but it is hard to convince people to use it, bitwarden is clearly the option and I am moving to it so I can help others. Another example is the browser, you can use chrome and make it kind of private but at the same time conviniant. It is easier for many people and not everyone is doing sketchy things or not everyone is being followed. I think it is possible to find a balance, otherwise it is better to not use a phone at all. Btw, I'm not criticising the video, great vieo, just saying what I think.
i agree with you, i don't want corporations like google or ms using my data but i think there's an obsession with hiding everything from the government 1. not everyone lives in the US so not everyone should worry about the FBI 2. sure the FBI will see your data but if you aren't doing anything illegal they won't sell the data, and even then they only actively spy on you if you're a suspect 3.i sometimes pirate stuff but when i do i take every precaution (tor,protonv etc.) but i don't think people should use them 24/7
The problem with online password managers is privacy. Once the data is uploaded to who knows where even encrypted, it's no longer under your fill control like a local file in KeePass.
Howdy, you are doing good with your advice, there are some things to mention regarding making false tracks send out really weird if possible triggering messages , and wait: Voila you know who you can trust, keep up the good work
What to do about the "threat model" where you arrive at an airport and the government agent demands your password (to your phone) which in most cases will give them access to everything? What if the same people discover your hardware key in your pocket and insist you reveal the passphrase for that? What I'm getting at here is, where do you find a digital "buried box in the backyard" where you can hide a "ultimate backup". So that you can cross borders (for instance) without carrying any stored secrets.
I wanted to write a comment what the most convinient things to do are for more privacy, but they get deleted all the time, so i just use this as a testbed now for blacklisted words which will get your comment autodeleted. okay different approach, ceasar encryption. the word is becmpdlfs now the letter 1 left from what is written means b is a as an example. Nice yeah that works. If you figured out what i wrote, should be easy, try to comment it under my comment. Wait 20 sec, refresh and see your comment gone.
You can actually move frame by frame on TH-cam, idk what keys this is on a qwerty keyboard but I'm on an afnor azerty keyboard and the keys are the two keys next to the N (I think it's the M and the right next to it, on a qwerty keyboard)
There's no sign up page or any thing like that. The GROUP ANONYMOUS hides themselves and do good work. They raise awareness about things that are hidden from the public. They hide their identity and expose evil.
@@nikhat6884 It's not 2007 anymore. A lot of the groups associated with Anonymous were nabbed by the feds and are most likely working for them. Anonymous is now Q for Occupy-era millenials.
I'm so secure that I now have a black SUV with tinted windows parked outside my house 24/7
That's how you know you're doing it right.
they are catching on
Doesn’t that mean you had vulnerability that led them to you
@@ashwinalagiri-rajan1180 you have to think about the long game
@@ashwinalagiri-rajan1180 ye, but now that they are there, it's easier to kill them. Let your pray come to you and not you to it, sort of deal.
good job making a video like this and not just saying 'use tor lmao' like everyone else
This is good and great for most use cases, but tor is so much better than anything like this.
@Mialisus it could be because its open source meaning trusted people are able to review the code
Mialisus it was originally created by them but now it is independently run, it is apparent they don’t have a backdoor because of all the work they have to do to catch people who commit crimes on tor.
@@kyy. on who’s authority are they considered trusted? Open source is good because you yourself can review the code. Which obviously necessitates knowing what you’re looking at.
@@notaboutit3565 it is a lot hard to lie as a community than one person lying. multiple credible sources are using this software every day to circumvent censorship and countless of drug markets are using this. there wouldnt be this much going on had they been inserting malicious code
"advanced interrogation techniques"? here, in Russia, we call it "thermorectal cryptoanalysis"
@makaroner Same in Poland...
Aka Homeo thermo erectis
i thought in Russia you guys called it "Gulag" (or if its a covert operation, Siberia)
Well im fked regardless, prior head injury so cant remember the shit to begin with. Theyll have the damn rooter coming out my mouth before i remember which password i used.
@@ThirtytwoJ you can borrow my phrase for that CRS as in can't remember shit, I had a brain hemorrhage stroke May 25 2021 left me with a sensation problem with the right hand! I get to drop a can of soda or something else at least once a day! Then I had a regular one in April of 22 affected my speech for hours but it looks like if I'm stressed or panicking I CRS, who knows why! Hope you get better every day ❣️
11:50 Actually, TH-cam does support stepping through a video frame-by-frame. I do this a lot. While paused, you can use the '.' and ',' keys to go backwards and forwards by 1 frame at a time.
i was about to comment the same thing
@@Demian1 yeppers
Yes I also knew this... however being a "power user" TH-cam since basically its creation... I often watch videos at faster speeds to peruse the content faster.
I really wish there was a super easy way to watch videos essentially as fast as you would like to watch them. X2 isnt fast enough sometimes.
( I realize there are some workarounds just not really convenient)
@@codemiesterbeats There's a chrome extension for that. I have installed it, and it is pretty useful. It goes up to 16x speed
I figured this out s long time ago (I swear it was letters though) but couldn't figure bit out again. TY. hopefully odysee copies (they do for a few shortcuts)
i am extremely interested in the hypothetical longer video. the longer and more detailed the better. this is something i've been wanting to commit to for a long time, but i don't want to waste my time by only partly securing my privacy. good channel btw
That is the issue, yes, only investing partly.
Well, if you are one of the people who "have nothing to hide", even just doing it partly to normalize using this software and to reduce your data footprint is still useful. Be as thorough as you have time to be.
nowadays, everything is being tracked. the way to be truly anonymous is to live in stone age, as the graph shown, very inconvenient.
not everything. just keep buying open hardware and load it with open software. if you must run something closed it better be sandboxed.
Anarcho-primitivist gang rise up
@@maxine3978 no
*The industrial revolution and its consequences have been a disaster for the human race*
Make a 2nd internet
I love how this video casually mentions how fingerprints are bad if you are going to do highly illegal things
"if your threat profile include law renforcement" he doesn't judge lol
What counts as "highly illegal" can and does change at the whim of the parasitic ruling class and their puppets and their rabid attack dogs(like "AFT") all the time, and what people call "law" these days is rarely enforced equally. representatives of the parasitic ruling class and their puppets can and do get away with almost anything.
Allegedly you have freedom of speech in most EU countries, yet people are arrested for expressing their opinions on the internet all the time.
@@AuxenceF we don't all live in Western countries.
Big respect to all the Mei's and Vadim's out there fighting their authoritarian governments.
Every government is authoritarian. Those Mike's, Tom's and Josh's who live in western countries should strive to do the same as those Mei's and Vadim's.
highly illegal things might not be bad things morally depending on which country you live in
Man, how do you manage to up a new video for this channel every single day? I mean, every day there's a complete new video with more than 10 minutes where you went in some topic with some dept. You don't just post crap to fill up your channel, new quality stuff is up here every day, it's a really great work to see being done even for a popular channel. I'm loving this channel so hard, you deserve more for what you do.
This
autism is a superpower
FBI funding
LOL previous comment: Clearly huge shout-out for posting that content : it's becoming critical and everyone is concerned with what's coming 🔮
I've posted huge comments😅(sorry for that ) but related to the topic of that video as i have some concerns regarding, possibly prior (cleaning footprints years piles of linked datas from years of bad practices which i believe is a good 90%+ of regular internet users. And i would like to know if it's worth the time and investment in this quest (check my comment) ..... THEN ONLY APPLY EXCELLENT ADVISES SHARED ON THAT VIDEO 👍🏻
Step 1 grab computer and phone
Step 2 throw them into the trash
Congrats you have into cyber security
Hahaha something like a skit
Something tells me there is some spook in the government that upon the right set of circumstances this suave guy just knocks on the door and says "hi I am Mr. So-and-so and I am your cybersecurity consultant."
He politely asks where each of your computers and devices are, past and present, then he unceremoniously Chuck's them into the f**k it bucket.
Nah
You first have to boil all of your electronics
ALL OF THEM
Yep OP forgot Smart Tv, watch, Car, and most importantly : Trash your hyper connected friends and family following youwith full voice assistant on 😅
Definitly make a more in depth video. And try your hardest to make it normie friendly because they're the ones that really need to hear this. I think you do a good job with that normally, but since normies actually seem to care about privacy they have a much better chance watching it all the way through if you give them a padded safe space to explain that they're still being spied on even with brave and nord vpn.
Even with brave!?!?
@@supasf if it makes you feel better your CPU is spying on you too.
@@Bagginsess well that's reassuring, thanks
@@Bagginsess oh heck, the CPU too? How do I stop that?
@@warriorbuilds3145 buy an old cpu that doesn't have the Intel or AMD memory management systems. That's one of the main reasons people like older thinkpads. Fair warning though, in order to do this requires libre booting which isn't easy and can brick your systen. Plus no one really knows if the cpu is just a hardware backdoor or actually communicates over the internet, either way linux cuts down on spying by 90% vs windows with the CPU being the only concern. Welcome to the bs of c-sec.
I love these deep dive into maximizing security. It would help those that care about not being tracked a lot. Not many internet resources can describe them as good as your video (either being too technical or too simplified to the point that it only scratches the surface, tell you to use this use that, no reason given)
This shit is so basic, yet so essential (and still many people don't know it). This video should be required viewing for every single human being before they are allowed to use the internet.
Agreed! 💯
@@Zombicorn731 No
11:50 TH-cam does support frame-by-frame panning. It's the period key.
too bad that buffering makes it remarkably poorly functional
TH-cam does allow frame by frame navigation with the . and , keys.
TIL
Yeah that feature has been available for years.
but each time u click it they track your fingers on the keyboard 😮
@@franatrturcech8484 yeah, this is actually true. Google are using an advanced tracking method through which they can tell exactly where your fingers are on your keyboard by analysing your keypresses
not working on my machine
TH-cam does support frame by frame skipping. Just press the < and > keys.
I feel like I'd only really need to do all of these things if my profession really required it, for example if I was a higher up CIA agent or something. I think some of these could be pretty useful for most people though, so I'll keep them in mind. Thanks
It really depends on how much you value your privacy over convenience.
@@itsthemightyd2339 I do a few things to safeguard some of my privacy like using Firefox and DuckDuckGo, but even then I don't really have a choice but to use Android on my phone (for a few reasons) and Windows as my main OS (for school), and those operating systems definitely spy on you. I wouldn't really do something just for some extra privacy if it seriously impairs my everyday computing experience, especially when data collection is inevitable in my scenario.
would you feel comfortable with somone watching you and following you around every single moment of every day. listening to every conversation. just watching you. all the time. then using this info to stop you from traveling. or taking a loan. or having children. perhaps selling that info to your employer so that they can find a reason to fire you. ??
nowadays its good to be paranoid. privacy should be for everybody, my life and everything i do with it should not be worth $4.91.
@Robot Maniac customization
Securing your hardware and your Operating System are a bigger priority. Also securing your location because if you don't want to be tracked you shouldn't do it from your home address or from a place with video surveillance.
Watching videos like this so i get paranoid and stop using technology so much so that i can remove myself from behind a screen so often. Im playing the long game
1:35 Password Managers
3:31 Email
6:43 Messaging Apps
8:37 Browser
16:12 Search Engine
18:37 VPN
Thanks for the video!
Thanks for the timestamps :)
seems mindbogglingly insane that anyone would have just ONE email address.
Na. Even normies like some of my friends' 60 year old dads have atleast 4. I don't think they did it for privacy but still, I personally don't know a single person with just one. Everyone has atleast 1 work and 1 personal. But that is as far as it goes.
@@gurubhaktmohit Almost everyone I know has only 1 email, and here I am with 8 different emails
I think alot of people have 1 email, but if they say so, they can be targeted
I only have one email account for everything, but personnally it's because I made it when i was 9 so I could play games and waatch minecraft lets plays, it is very usefool and I always feel safe knowing someone always here for me
Exactly. You got your business email, personal email, trash email, trash email 2, and archive email.
16:53 it's easier to use the "multi account containers" and "temporary containers" addons for firefox
'advanced interrogation techniques' hmm
It's not waterboarding if you use diesel
Works great on minors, they can't even present the evidence in court!
@@mchlkzmn little do they know I do it for fun
@@Sk0lzky "We do a little trolling"
I just signed up for Mullvad after hearing about their search warrant from the local government. No user info was compromised, which is amazing.
Ur on a roll, pumping out these vids. I see you recommend everyday. :)👍
update this
If only if it was possible nowadays. We are just gonna wait for him or other content creators to reintroduce and update the topic in general. I suppose.
+1
@@lashlarue7924 what a bot, good thing the filters prevented you from spamming the whole scam phone number
I really appreciate you explaining in detail how everything works, very high value content!
The reason behind the tracking data is not to understand what user XY is doing but to understand what people do in general in a specific group. Such data might help in noble cases, but ofc can be used negatively, remember IBM barcodes in germany.
Let's be real- if the feds or LEO's want access to your device, they 100% have back doors into every single device out there. I operate under the assumption that NOTHING digital is even remotely safe or private, and act accordingly. If I do things I don't want the government knowing about, I leave my phone at home. If I'm having a conversation I don't want recorded or monitored, I leave my phone in the vehicle or at home. I don't send messages on any digital platform that I wouldn't want law enforcement seeing, and I assume they see and read everything I send. I don't use digital payments of any kind for anything I don't want the world to be able to see. You cannot trust anything digital or anything with a microphone, camera, or connective abilities.
I use a pair of pigeons when communicating with my friends., yes it's slow but pretty private. lol jk
This is a fact. 💯
I love those security autism video, it always kick me in the butt to up my security game. I'm one of those normie that use the same google account for everything. Instead of using a email service, I'll go more the luke smith way and make a email server for myself.
This does not compute... "normie User" and "make email server" ... i call bullshit
@@nictou gotta know what you don’t know
@@nictou he’s someone who has the technical skill and knowledge to make an email server, but he’s a normie in the sense he didn’t give a shit about making multiple email adresses
rolling your own mail server is not the most secure solution. You're almost certainly not good enough to make it secure if you don't do it often and aren't otherwise a talented engineer. Use a more secure service instead.
TH-cam supports frame-by-frame, use the < and > keys.
I would like to know more about bypassing SMS when creating accounts
might be late, but there's easily accessible sites with common numbers for sms confirming services. the site has like dozens of numbers for the main countries for free. the one i used had a sms history, though, so maybe -1 for pivacy. but it does get the job done for unimportant, annoying stuff.
Ditto
Never understood the whole password manager deal. I don't trust such sensitive info in the hands of a manager that could get comprimised. Keeping your passwords on paper in a safe (maybe one that's fireproof) or somewhere you know is safe, in my book, is much safer than a password manager.
There are password managers you download and aren’t connected to the internet at all, just if you lost access to that device you can’t get the passwords back for a new device.
The sherlock holmes 2 method of random bs in random book is looking better n better. Problem is post head injury i cant even remember the password so how the fk am i gonna remember the cipher?
Or just have a really good memory
I set up a proton mail specifically for this youtube channel and now I feel vindicated lol
11:50 you can do that on youtube by pressing "," and "."
I love you.
I have long had a desire to create a separate device for perusing the web as Anonymous as possible... While I am relatively tech-savvy. I am not certain that I would have had the foresight to avoid accounts created on a Normie setup...
It is sort of self-explanatory when you think of it... essentially you are creating another identity tree. Sometimes people get too hung up on the idea of being completely Anonymous when in reality you are trying to keep "identity trees" separate.
An important step to keeping vpns private is to install an outbound firewall so that your gmail isn’t syncing over the vpn connection every 5 seconds. This is extra important if you use Windows.
I will start downloading valueable videos dark times are coming.
if you have time and resources, also try to gather a few books that might be deemed as "prohibited knowledge" in a not so far future.
godspeed and be safe, hard times are coming...
@@itsdokko2990 prohibited? man amazon literally has books on whatever knowledge you seek, the anarchist cookbook is an example (only one know off the top of my head) and several others.
Hell, with the info amazon gets, you'll probably get into an amazon recommendations rabbit hole.
@@randomdude4110 The anarchist cookbook is ass. A lot of the stuff is either wrong at a fundamental level or is plain dangerous to follow. The archives of oldschool chemistry forums are OSHA compliant in comparison.
@@randomdude4110 They don’t carry certain books. All it takes is some dork to say a book is “problematic” and they have to take if off the site.
@@ChucksSEADnDEAD Clearly you skipped the part where I used it as an example. I never said to follow the instructions of said book.
Thank you for these videos! They're very helpful.
Nice video, but my method is much simpler:
First, determine where you have a laptop for a desktop (I will assume you are using a desktop).
Next, open it up and locate your network adapter.
Step three is simple, just rip it out.
Lol, I created so many gmail accounts when I was a small child because I can't remember the password😂
@panapoly lol I tried the same thing and got 36 account lmao😃😂🤣
Please do a deep dive into security&privacy. Tyvm
0:03 that explains while surveys are much more profitable in the US.
Great video. I use secure email services with end to end encryption built in, in addition to secure, end-to-end encrypted, open source anonymization relay services. Never reuse an email or phone number, or any type of login across platforms.
People will learn real soon when reusing the same password. lol Honestly I've done it in the past, and while I didn't get hacked, once my info showed up in HaveIBeenPwned, that taught me a good lesson.
1:34 I have my own mail server, and it's one of the best decisions I made for privacy.
and, do you host it yourself? or is it on a VPS or whatever?
@@minecrafter9099 I have a secure vps. Though self hosting is an alright option.
Hey Outlaw, great video again. I wanted to know what are your thoughts on Telegram and the level of security since I've been using it for a while and I really like it. Your videos have been really helpful so far and I find the content of your channel to be really important for the community, so thank you for what you do.
this guy is a walking opsec holy nuts, subscribed lmaoo
You can step through TH-cam frame by frame with the < and > keys.
11:43 try the . And , keys. That lets you go frame by frame
We truly live in a dystopian world
22:20 I use Whonix when I need JavaScript with Tor
"Don't use paid password managers" and "if it's free, you're likely the product" doesn't add up. I use Bitwarden and happily pay for it.
To add to that: "Open source is always good", not always the case. In case of Bitwarden, the frontend software is open source, but your data is stored in a third party cloud service, called Microsoft Azure.
maybe a better saying is "If its a free product offered by a for-profit business/organization, your likely the product" KeepassXC is a good password manager because its 1. open source 2. localized to your computer in an encrypted database. 3. offers 2 factor authentication in the form of a physical qb key or a secondary authentication file kept on a usb stick. Cloud based password managers are very convinent, but always come with the downside of your info being hosted on a remote server that is a potential hacking target.
i made my own password manager with my own encryption, i know people say don't do it. but i trust myself and my coding skills enough to believe its pretty difficult to break
Yooo that's hella lit, I wanna create stuff like that but don't know where to start;( any tips?
@Lucas Zhu is there a good reason you would like the source code instead of just taking it as your own like most people do
@Lucas Zhu ok. Well I did. It isn't that difficult to make a password manager. I mean the encryption was pretty difficult. Plus I'm not even sure if it is even close to being secure
Understandable how people dont think much about privacy when its inconvenient.
I fw your content. This content really helps out the people.
the reason why most people wont show their internet history to their closest friends but dont care if a corporation knows it simply is because the corpo doesnt judge them. imagine your ISP or google would be like EWWWWWWWWWWWWWWWWWW whenever you look for hentai. you suddenly would care a lot faster for internet privacy
@miserable excuse for a human being I think so? idk I always go incognito to not have a search history (on my phone) in the first place. my ISP obviously does and I hope they are disgusted xd
So true, when I wasn't a linux user and didn't care about privacy I always thought to myself "well yeah google knows I did that but what are they gonna do, judge me?"
you can step through frame by frame on youtube with , being back 1 frame and . forward 1 frame. Audio doesn't play with the frames though.
Using cloud password managers is using the same password for every service stored in that database.
ok then, what do you use ?
might as well write them down on a notebook unless your 'threat profile' includes actually being picked up by the alphabet guys, in that case idk maybe keep the notebook in a small case that includes a bottle of lighter fluid and a box of matches or something. Or just memorise every single password by using a spaced repetition app like anki
Alternative title: how to find privacy in the antithesis of privacy.
Thank you sir, very informative.
14:30 but running an alternative plugin changes your browser footprint and makes you easier to identify, wouldn't you just use the "safer" options in preferences to achieve the same effect?
It depends on the plugin. I don't think any JavaScript blockers compromise your privacy, at least not nearly as much as they protect it.
@@detroityeet7048 that's good, I guess that's a valid point, I guess I just figured safest mode had an in build JS blocker
Very helpful thank you, there were many services that i didn't even know they existed
Thanks for these kinda videos. They're really informative and helpful
thank you for making this video really accessible, and easy to share.
There is no 100% anonymity or privacy, only thing you can to is to take measures to make tracking and/or identifying you harder.
I suppose the only way you could be actually Anonymous is to not exist in the first place.
The main takeaway is to create different online "identity trees"
A key part of that is not linking or branching your various "identities.
Enhanced Interrogation Techniques
or as it's more commonly known as: Torture.
True anonymity is pure randomness
which linux distro are you using?
Hey Alphabet Boys, just wanted to let you know that i'm here for education purposes only
Hey Alphabet Boys, just wanted to let you know that unlike this user I'm here for other purposes
What about MAC obfuscation? Does using a VM generate a separate MAC address to avoid cross contamination?
It should, and you can change your mac addr easily
Thanks for the video. What do you think about spoofing the MAC address? Is that a good idea?
The < > keys let you frame step on online TH-cam videos
11:55 You CAN move frame by frame by using keyboard shortcuts (comma and period), though.
the buffering is also and easy fix by just not mashing either keys.
DDG May be privacy respecting, but goddamn it's as biased as Google (just on the other spectrum). Sometimes I can't find news on DDG that I could on Google. Maybe it's because I don't live in the US.
This should be taught in school.
Also, I wonder what Mental Outlaw thinks of PureOS, Librewolf and Ungoogled Chromium?
Should we sacrifice ALL of our comfort for the sake of anonymity? One could use a password manager like bitwarden, for example, and have balance. I use keepass but it is hard to convince people to use it, bitwarden is clearly the option and I am moving to it so I can help others. Another example is the browser, you can use chrome and make it kind of private but at the same time conviniant. It is easier for many people and not everyone is doing sketchy things or not everyone is being followed. I think it is possible to find a balance, otherwise it is better to not use a phone at all.
Btw, I'm not criticising the video, great vieo, just saying what I think.
i agree with you, i don't want corporations like google or ms using my data but i think there's an obsession with hiding everything from the government
1. not everyone lives in the US so not everyone should worry about the FBI
2. sure the FBI will see your data but if you aren't doing anything illegal they won't sell the data, and even then they only actively spy on you if you're a suspect
3.i sometimes pirate stuff but when i do i take every precaution (tor,protonv etc.) but i don't think people should use them 24/7
The problem with online password managers is privacy. Once the data is uploaded to who knows where even encrypted, it's no longer under your fill control like a local file in KeePass.
you can move frame by frame tho on youtube with , and .
Howdy, you are doing good with your advice, there are some things to mention regarding making false tracks
send out really weird if possible triggering messages , and wait: Voila you know who you can trust, keep up the good work
TH-cam actually does support skipping frame by frame. While paused ',' is to go back and '.' is to go forward.
I just want to add on to the "Use multiple e-mails" part. Firefox Relay is a pretty good option.
You probably know this, but the '' keys let you step through a paused video, frame by frame on TH-cam
Actually I’m pretty sure TH-cam lets you go through frame by frame if you use the full stop and comma keys (I think) on desktop browsing
Love these! Definitely interested in anonymous phone verification accounts.
What to do about the "threat model" where you arrive at an airport and the government agent demands your password (to your phone) which in most cases will give them access to everything? What if the same people discover your hardware key in your pocket and insist you reveal the passphrase for that?
What I'm getting at here is, where do you find a digital "buried box in the backyard" where you can hide a "ultimate backup". So that you can cross borders (for instance) without carrying any stored secrets.
There's something called "Plausible Deniability", basically a fake password which seems to unlock your device but will not reveal all your info.
@@BillAnt I'd like to see an app that does this well.
@@saumyacow4435- It's actually built into some of the password managers.
@@saumyacow4435 - Some password managers have it built-in, look through the features list.
excellent video! The only thing I don't think you mentioned is random mac addresses. what do you think of dead man switches?
Some of this stuff is more trouble than it’s really worth. Privacy is great and all but at a certain point it becomes more of a full time job lol.
Yeh it is more about finding a balance
That's the mindset the government wants you to have. :^)
I wanted to write a comment what the most convinient things to do are for more privacy, but they get deleted all the time, so i just use this as a testbed now for blacklisted words which will get your comment autodeleted.
okay different approach, ceasar encryption.
the word is
becmpdlfs
now the letter 1 left from what is written means
b is a as an example.
Nice yeah that works.
If you figured out what i wrote, should be easy, try to comment it under my comment. Wait 20 sec, refresh and see your comment gone.
adblock
@@benni1015 adblocker
You can go frame by frame in the browser player by using comma and period while paused.
I use Bitwarden, am pretty happy with it
with half a mil views surely he will make an updated version right?
Wrong...
You can actually move frame by frame on TH-cam, idk what keys this is on a qwerty keyboard but I'm on an afnor azerty keyboard and the keys are the two keys next to the N (I think it's the M and the right next to it, on a qwerty keyboard)
Wonderful video.
Hi guys, can you tell me how to join Anonymous? I already visit 4chan since Summer
There's no sign up page or any thing like that. The GROUP ANONYMOUS hides themselves and do good work. They raise awareness about things that are hidden from the public. They hide their identity and expose evil.
@@nikhat6884
I think it was a joke
@@OggerFN well if he really wanted to do something good for everyone
@@nikhat6884 It's not 2007 anymore. A lot of the groups associated with Anonymous were nabbed by the feds and are most likely working for them. Anonymous is now Q for Occupy-era millenials.
@@ChucksSEADnDEAD This is the best rundown.
I'm using gnu icecat on my system and youtube loads just fine.
Would appreciate a video on phone number verification for online services like gmail.
NewPipe also bypasses Age Restriction. That's for mobile
Unfortunately, newpipe can't play age-restricted videos anymore. It only displays "video not available"
@@jamesentenaro6830 Noticed it! Why is that?
@@phrogtesem9410 I don't know but I hope it'll be fixed
Love the content bro👍👍
TH-cam absolutely does support going frame by frame. It's just not something commonly known.
There is a chatting app being developed called Berty, you should keen en eye on it, because it also works over bluetooth if internet is not available.
I've seen a lot of buzz around Signal. What are your opinions on Telegram and why would/wouldn't you use it?
Not e2e encrypted by default
telegram isnt e2ee by default and has handed over user data to law enforcement several times
Yes please could you please do a more indeep video please love depth that you go into in your videos another great video
"take matters into your own hands"
this is the dogwhistle i came for
brb
Posteo is also a great privacy-respecting email service provider.