Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: Brilliant.org/DavidBombal The machines are already tracking and watching you. And they're influencing you. The future looks bleak. Do you really want to live in a Skynet world? I interview Rob Braxman - the Internet Privacy Guy. He's a public interest hacker and technologist. He uses his extensive knowledge of cybersecurity and tech to serve the public good. He cares about privacy. He warns you of digital manipulation, disinformation, mass surveillance. // Rob Braxman’s SOCIAL// TH-cam: www.youtube.com/@robbraxmantech Website: brax.me/home/rob GitHub: github.com/robbraxman X: x.com/robbraxmantech // Specific Video REFERENCE // Is Skynet already watching you?: th-cam.com/video/To5Nbs6DmIA/w-d-xo.html Neuralink a Weapon?: th-cam.com/video/1SMbvhXI6wk/w-d-xo.html AI will deliver Utopia they say! Will it be an amazing world!? (Tongue in Cheek): th-cam.com/video/kJ3mkQ4wFdk/w-d-xo.html Signet 2024: Infrastructure is Complete!: th-cam.com/video/9xPjIfJI5Jk/w-d-xo.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 00:50 - Brilliant (Sponsored Section) 01:55 - Intro to Rob Braxman 03:31 - Explaining "Mesh Networks" 05:14 - The Internet Privacy Guy 06:30 - Apple Encryption Scanning 08:41 - Client Side Scanning 09:34 - The Evolution of AI 11:27 - TikTok Collecting Data 13:57 - Explaining the Predictions 16:20 - Client Side Scanning Laws 18:49 - Opinions on Neuralink 21:20 - What Feeds the AI? 22:25 - Google is the biggest threat? 26:45 - The Cookie Problem 28:12 - Social Platform Cookies 29:38 - Navigating Google Sites 30:23 - Cross Device Tracking 35:09 - Sending Data to The NLP 35:57 - Moving Away From Cellphones 38:24 - How to Navigate Computers 40:30 - Cellphone Software Suggestions 42:12 - Downloading Apps 44:51 - Receiving Notifications 46:09 - App Limitations 49:18 - VPNs & Search Engines 51:59 - The Threat Model 53:23 - Search Engine Recommendations 55:16 - Information on Jigsaw 57:36 - How to be Private Online 01:00:32 - Pseudo anonymity 01:02:09 - Rob's Last Words apple google degoogle phone degoogling a phone ios skynet robocop pine phone privacy online privacy online privacy guide internet security tracking online privacy for kids online privacy and security online privacy it doesnt exist online privacy tips online privacy ted talk online privacy guide online privacy for students internet security tutorial edward snowden naomi brockwell privacy five eyes 5 eyes brave browser tor protonvpn protonmail duckduckgo google online tracking ios android graphite phone privacy browser privacy browser ios privacy broke privacy browser for pc anonymous hide online hidden identity hide identity online data hack identity internet privacy social change technology Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #privacy #anonymous #hack
"Your VPN won't protect you" this is true for those who don't know how to use a VPN and how to seperate their own traffic. Browser isolation will probably not be enough either (if all your network traffic on that device is going through VPN tunnel), your identifiable traffic should NOT go through your VPN tunnel as that can then be associated with your 'anonymous' traffic, which essentially de-anonymises you - this is the main point of failure that newbies aren't aware of.
Could you possibly explain how to do that on a phone? Is it turning on incognito and not using our network but rather our lte or wtvr someone may have?
@@cringesh1t427 As an example, you could install something like cyberghost VPN and brave browser and use them together in a isolated way. In VPN app options you select split tunnel, and then select brave browser, so that only that app will go through your VPN tunnel (rather than system wide traffic, which would effectively de-anonymise you through IP association!). Once that is set up, you should only use brave for anonymous usage, i.e. not log into google or facebook etc! I say brave because it has good anti-fingerprinting/tracking features, and cyberghost I know has split tunnel feature.
Well said, think of a VPN as a method of transport from home to a restaurant. The restaurant staff don't know how you got there, but know who you are!. That's what happens when people use a VPN and log in to accounts. Some will use Tor and log in with real details! Police have run a few VPNs, I found a WeVPN server on the IP range allocated to equipment on the 5th floor of a police station in Manchester UK only months before the company vanished with excuses. I think they had been exposed. Either it was a law enforcement project or a compromised server. All VPNs and companies hosting the servers must provide access to all data by Law in the UK. Not even protonmail is safe as encryption to their emails is added before and after it is stored on their system. That allows police access, also NSA and GCHQ access. It is only secure if you connect up via browser and send to another user on the system. Notice how they NEED phone numbers and emails for account recovery? I suspect the next Encrochat will be a VPN or Proton, maybe Tor - which we know can be deanonymised. Nothing is private now. You have been photographed in your car for 25years and added to a database, the same when out shopping. Your Alexa and phone has even profiled your voice, banks can access voice databases and photo databases to check it's you.
Wow I’ve been watching your videos for years. Happy to see you have Rob on the show. Love how privacy focus he is. Love the amount of good content you and him put out.
David - you already hold a high level of respect, and the fact you finally have Rob Brax, massive EXTRA respect!! Been following Rob for years, and been a customer as well for many of his products. Thank you
Ive got a plan, just buying a dumb phone, disconnecting from the net from time to time, make my own downloaded information cache (offline), download LLM and run locally and talk to people like connecting in real life.
You literally have the most fascinating tech podcast out there, because it just doesn’t glorify technology. It’s more real. it kind of merges technology with the aspect of human nature, rather than painting some techno Utopian BS.
Your video titled VPN won't protect you was the video that triggered this contribution. I can't register to a monthly subscription now but this video is worth contributing.
re tik-tok, I had understood the problem not to be that it's collecting data as stated here, but rather that what is collected is shared with the CPR gov't, and can be used to shape and manipulate the information environment of a sizeable portion of the US population. That's why they're not saying shut down Tik-Tok, they're saying sell it to a non-Chinese owned company.
Actually there are ways of shaping the thoughts of the US population by a foreign app provider. They can inject any kind of malicious message at any time or more subtle ones via videos. It's not good idea either way.
This is a very difficult subject. I was drawn in by the title of the video even though have not yet gotten a VPN. Watching this made me realize how much i am being tracked and by extension manipulated by, or rather, through my searching and browsing.
Google and Facebook mainly but also Microsoft and X (Twitter). Banks in UK will give Governments unfettered access to personal account info without any warrant if the amendments to the Data Protection and Digital Information Bill is passed and no doubt it will be fed into AI.
All European banks have obligation to comply with request of authorities and report amounts over those set in local legislation. Unfortunately money-laundering and tax-evasion has led us to this. Idk how it's done in US or elswhere. On a brighter note, personal data kept by companies is under strongest protection in EU than anywhere else to my knowledge. Truth is, if you want privacy, simply never put your life online on social networks, rest should be out of public reach. We can still be partly anonymous on this platform even with accounts, can't we? Actually nefarious powers (long story) are using this anonymity to attack us as much as own goverments use PII data to monitor and control the law.
Rob mentioned, that mobile phones does not need a VPN. Why is that? You sit at an Italian café, you're on their wireless network and the local hacker sits in his van on the same network. Why is VPN not a good idea here?
@@asdfqwerty5389 @davidbombal It really is a confusing remark by Rob. I've listened to it over and over, like Lt. Columbo would do, but to no avail. Why is VPN on mobile phone not a good idea? He mentioned IPv6, but how would that break the encrypted end-to-end VPN tunnel?
A VPN is no use, why use WiFi if you have 4G/5G? Sites use HTTPS now, so it really does take someone really clever to spend time messing with your traffic. The WiFi pineapple is not really useful and doesn't do what people think, the same as a Flipper will not enable you to steal cars! I use a VPN to home , wireguard to a Pi with PiVPN and use OpenVPN with a router - only to stop work blocking sites! It also puts me out from my home IP, meaning I can watch TV, share files, use my bank etc. Commercial VPNs are in lawless countries for a reason, so they don't need to protect your data and can sell it knowing you can't do a thing. They all have to supply your data to GCHQ and NSA and police too.
IPv6 uses a unique ID or address on each device, so this is identifiable anywhere like having a phone number, IMSI or IMEI. Again, it doesn't matter how you reached a site, it knows who you are. With IPv4, you can change the device IDs and not everything is unique.
Snowden already warned us about this. It doesn't need to be A.I. controlled. All they need is your phone number, the network you're with, and by proxy the SIM card ID and pin. And then a government hacker can remote control your phone and see browsing history and app use history. And of course, see see all your contacts, messages, social networking, and of course they can get around the encryption of messages from WhatsApp and Messenger as they're viewing it through your phone as if it were a window. What's ironic with all this!? I guess the fact that you get charged on your phone contract for the data they use to stream your phone to them and encrypt the address so to cover themselves. 😂😂😂 xZx
I’d love to hear what you guys think about IEEE specifically 802.15.6 since it basically goes with the neuralink topic. This is the intro extract if you’re unfamiliar; The standard defines short-range, wireless communication in the vicinity of, or inside, an environment such as a human body, vehicle body or both, using the Ultra-Wideband (UWB) and narrow-band physical layer (PHY) and medium access control (MAC) to support enhanced dependability in human body area networks (HBAN) in the industrial scientific medical (ISM) bands and local medical regulations. The standard supports quality of service (QoS) and data rates up to 50 Mb/s and incorporates support for vehicle body area networks (VBAN). The standard specifies the coexistence of multiple piconets, including inter-body area network (inter-BAN) interference and inter-piconets interference, simple MAC protocol, and sensing and feedback control loop delay. Definitely worthwhile checking out & while your there you may notice other frequency channels & there uses examples 802.15.4 & 802.15.3 ect… It would be a great show to have it as a 3 tier view point of Rob, OTW & yourself
I have 2 VPN router’s . If I want to connect two of them , in my house ( my normal router connecting with 1 VPN router and the second one connected with the first VPN ROUTER , like a train ) with 2 different 1 year a subscription not make in the same time WILL BE BETTER , MORE SECURE ? Can you please answer me ? Thank you very much .
Rob is correct on the privacy front and regarding the misuse of capability. If there is a computing/technological capability available to corporations or intelligence agencies, they will use it, and they will use it in such a way that user/device-owner rights to privacy and, indeed, ownership rights, will be harmed. In hacker terminology, these people want to sell you devices and software and to own those things at the same time. Preferably, they will be able to extract a subscription fee for the privilege of being owned and having your personal data stolen and sold on the open market. Our governments encourage this, to give intelligence agencies and law enforcement the "tools" they need. Never mind that these agencies have long had far more access to data than they need. In exchange for stripping citizens of constitutional rights, tech-illiterate politicians have long given tech companies a blanket regulatory pass on their rapacious surveillance practices. So long, that is, as the key agencies get their "tools" - complete with GUIs for desk jockeys who do not actually hack anything themselves. We need to be aware of all this stuff, in the first instance for our own dignity, but beyond that to change the political culture that has allowed this stuff to go as far as it has gone.
I despise smartphones. Every bank I deal with is starting to demand it, you can't set up an online account without one. Every business seems to be pushing it. I think the entire thing is nefarious but then I think all cars being various shades of gray or black is too.
I am using GPT for learning about many things, also fixing my PC and consulting steps. I am glad I didn't share my serial number with it, was quite weary sharing with them anything of this kind. Glad I was.
Braxmen seems like a fed selling honeynet phones. His solutions to evading tracking do not pass the sniff test. Using a different browser and not logging into your Google account does not evade Google. The user agent, GUID, ip address, and device sensor data all correlate your identity. It’s game over.
user name*, censor data is you laptop/phone is always recording a history of gps, towers, and wifi access points. that data is then sent as telemetry, to track and identify not only you, but where you’ve been, and who you interact with.
This was so interesting to watch, I am just still so puzzled about being anonymous on the web. It is so hard to sign up for anything nowadays without tying yourself someway some how, verification of email, phone number , etc ! I really am to the point is that I don’t mind being on the web and seen but I monitor all my things EXTREMELY to make sure I am not being taken advantage of AKA hacked. It’s just so hard to stay in the dark on the web nowadays if you are a regular user of the web, content creation, and the list goes on!
The best policy is to remember this... 'walls have ears' Big brother is watching you! 'They have all the resources they need to find ways to snoop on you'
it is getting that way, i actually fear my devices. the naysayers say, "if you do nothing wrong what do you have to fear", my response to them is who determines what is right or wrong and will right or wrong always stay the same.
A VPN is only an internet anonymity ponzi scheme if I decide to cash out and sell the encryption protocols. But you will never know either way, so it's all good.
If you can't see how a service is being paid for, then it is usually stealing and selling your private data. Personally I have no problem with law enforcement having access to my data - it is commercial people who want to make money from my info (usually my own money in the form of higher prices) that I really object to.
@water1374 Thats not how most serfs lived. They lived well and only worked a fraction of the time as a wage slave. Yeah, there were instances of badly treated serfs but it's blown way out of proportion
I’m in one of those people in that 10%!! I been following rob for a lil while now and I’ve learned slot!! But thanx to the both of u!! These vid are very helpful, educational!! Thanx again!!
Far left in the US today is a Reagan republican today. Far left in America is probably center right in Brittain. There's a difference in disliking a political figure like Hillary or Ted Cruz, and saying they are traitors and should be locked up, or worse. It's far worse on the right, which is filled with a constant drum beat of violent rhetoric. Despite my difference in political opinion with him, I enjoy and find his videos informative.
Cookie tracking is for basic website plebs now, fingerprinting is how all the real players do it... That's why they don't mind all the cookie blocking people waste time on now.
Long story short, vpn is good so your info won't get hacked through packet sniffing but your data is still being sold regardless if you use a vpn or not and this includes being on your home network. If you dont trust the network you are connected to or dont trust others on the same network then use a VPN!
I search for all kinds of random crap. I get ads for young girls to old men and everything in between. You can't tell what I like and dislike easily because I appear to like things I don't really like. Most people only subscribe or thumbs up things they personally like. I throw a wrench in that.
There's a very steep jump in giving up privacy just to go from "Luddite living off the grid" to "security conscious but not considered a weirdo", that's why it's so concerning. You almoat have to abstain from tech to have privacy.
Good content. However, regarding largest "public data" collectors. Yes Google, but what about TH-cam, they also hold and collect a lot of private data. How accountable are they, when it comes to privacy?
I don't use vpns for privacy ( i use it to go on pages google block ) and i'm a researcher been doing it for over 15 years my character is not what i search for i do it for analysis purposes
Why is it that if law enforcement want to tap a phone they need a warrent from the court, however companies like Google and Apple can tap into our phones with no warrent and zero knowledge or accept from the user /owner of the phone?! That is a very valid question to ask, I would love to see a video that investigate this further or take up this subject.
Those 'user agreements' that most people blindly click through provide the required consent for them to collect and monitor your activity on their platforms.
@@altologic I love to see a video that puts that agreement under the loop and translate exactly what we allow them to do, the case is that you have no choice but to agree, its not really an option to say No if you want your phone to start up.
...and DON'T THINK FOR A MOMENT that FLAW ENDORSEMENT need a warrant to install malware, etc. on your 'phone' if you are arrested for any reason & they got hold of it; in fact, They've got OTHER methods being used lawlessly/semi-legally. They won't necessarily need your 'phone.' Is ANYONE truly ready for the direction taken by this 'NEW' WORLDLY DIS- ORDER that I call the RUDE HURLED ODOR ?? So far, They just put the GUILLOTINES on your WRISTS; but, SOME things are only getting worse...at about the same rate as technology... such as THEIR 'psychology.' ❤ Y'all ! Peace...NOT OF this world. 😅
This vid reviewing it was still interesting its like a rethink tank. I re-read some books several times re-pluggin lose ends. Thanks guys keeps me mentally on rethinking research abilities.
one day i was looking through my mobile for everything related to location, (huawei) turns out there are system apps that's on(blue ticked) and grey out so it can't be disable, wifi, Bluetooth disabled, airplane mode on, doesn't matter you still get track through cell towers or satellite or whatever means they're using 🙄🤔
I don't know what's broke but something recently showed me that it's blue ticks now. Which I never used to. My bills jumped from .. like.. it jumped around 300 % ?.... I were robbed twice and I'm sure that my boss installed those cctv for deliberate filming ? Cos they bought like Chinese insurances as well. Which films everybody ?.... On top of my local healthcare. I'm sure somebody tried to drug me so that I get harmed... When you are poisoned... And no crime has been committed.... Every usage are paid fees...
I used to be firmly in the "I'm not doing anything wrong, so I'm not going to worry about it" camp. Now I'm starting to see the wisdom and importance of privacy as legislation like Roe v Wade has been overturned. Also, having a potentially skilled cyber stalker ect. I believe there's a recent news article where a man is trying to use state laws to follow a former partner across state lines with an investigation into an abortion. It's definitely an overwhelming process to start now, but slowly retraining myself 😅
Terminator picks up smart pewpew.. *click*... "what a piece of trash" *fires up machining shop and proceeds to turn a black powder into a boomstik instead.*
These big companies can collect all the data they want on me. But the moment they sell or use that data to negatively affect my life, they can expect massive exposure and lawsuits from every person that uses there services.
What about hardware backdoors? Also I am thinking if they can completely scan your computer or smartphone, the value of encrypted and decentralized data is completely voided. Is there anything not true about this statement ? This is very important when you consider that financial things could then be compromised also.
The blue print for google to build a defense against any app store that is being used as a work around, is being provided here in this video. That is the only draw back with this video, the information that is being provided, will also be used as a weapon against the offense. TMI on a google platform:(
@2:56 not to take anything away from him, but, many IP watchers “predict” incoming tech and data comps link with corp recruiters to let the cat out of the bag on certain companies about to enter a new market by whom they are seeking to hire (quietly via recruiters).
11:30- The deal about Tiktok from what I've heard is not the amount of data being collected by who is being collected for and that appears to be the Chinese government. That's what seems to be the issue.
@@davidbombal thanks for the tip. I use Firefox and some plug in on my pc and it stops ads. On phone I use the app. I guess I should stop using the app, the adds on TH-cam have gotten so bad.
So my question is if VPNs can't protect us what will. And imagine all that data we've backup on Google. How can we go back to a 100% security and privacy. Cause I remember at some point the was just typing words on my keyboard went to Google and Facebook then it brought that suggestions of what you may like. 😢😅😅 Then I started thinking do I have a keylogger on my devices
i found out from my analytic data that a family app is accessing my phone and data without me knowing about it. they can access ur phone and data without physically handling ur phone. they can even switch ur carrier and clone ur phone
Honestly, I kind of like google maps tracking me while I drive. If I ever get accused of committing a crime I didn't commit. That gps tracking history might come in handy.
This maybe out of context but I bought a domain that can be used as to send invite. Very new domain and not even public yet. I just did a couple test on my own email. Not a day went by and my hosting company contacted me that this corporation wants me to take down the domain as it contains their name and identity. And that I have less that a day before they take it down. I have paid for this domain already, what should I do with it? What are my options here.
NEURALINK is hardly Musk's idea.. It was the goal in the award winning game WARZONE 2100 (1999), which after implementing it, put humans in a suit, where they could steer the suit with its mind... (lots of servos in the suit, make you run as fast as a bike)
There is absolutely no way you can cover your tracks. Your data goes from your phone immediately to the Internet provider and that provider keeps track of everything as well. Google and all these other companies also collect every drop of data from your phone. And he is right when they stopped allowing you to take batteries from your phone is the day they started tracking your phone even when it was powered down. Everything you say and everything your camera sees at all times are recorded in the database somewhere.
Very good interview with Rob Braxman. I follow Rob since a few years now and this interview touches on a myriad of the usual Braxman-topics. Very comprehensive! 👍
When can we start talking about these topics on a more detailed level? I’m so far ahead of this type of content. I don’t allow syncing of any type, no location services, anonymously browsing, no peripheral permissions, no background apps, uninstall unnecessary programs, disable API’s, modify registry lines, manually install updates, only use windows local accounts, never sign in under Microsoft accounts, use GPS Scramblers, I even run 950nm infrared LED’s on the rear of my car to blind traffic and security cameras….I’m already doing everything you’re suggesting and have been for years. We aren’t simpletons…this man isn’t predicting anything here. I have never worked in IT and somehow “predicted” way beyond what Rob is talking about. Don’t buy his product, anyone can install a custom OS with the information available online. I run a custom windows 10 installation which I created myself and it’s DE-WINDOWED WINDOWS lol. For free.
I guess you can understand that there are people out there who find this content interesting. I don't see sciencists commenting on quantum physics videos just to say that this is too basic and we should go deeper ... that would be absurd 😂
Well...People like Me are not worried, nor do I know sh_t about most of the terms He or others use;however, It's the obvious surveillance age topic matter that I could probably have predicted far ahead of you and others who are tech- savvy wizards/knowers. So, BE NICE ya know-it-all(s). P.S. If you're 'driving' that car around AT ALL, the tyrant 'traffic law' can still make all your Constitutional & UNALIABLE HUMAN/Civil 'Rights' go BYE-BYE in a heartbeat...and IMPOUND your car...and SEPERATE you from Family/Friends/food/tech. etc. [maybe take your head off]...and RE-PURPOSE all your better stuff through asset forfeiture. I hope & pray not; but, It never pays to be over-'wise!'. If so...GOOD LUCK.
As far as him thinking, the January 6 people would not have been caught. Had they had a D Google phone, is incorrect. Because the phones of the other people will capture video of you and your face is already saved in the Google database and they know exactly who you are. And phones are absolutely everywhere. Cameras are too. Cameras on the stop lights track you as well.
I am fairly new to cyber security and info sec although I do have a computing background (many , many years ago). Even as a newbie I love watching your videos & your channel. I’ve learned so much about vulnerabilities, exploits, & hacking tools. This is a great video 😁 I’d love to learn more about backdoors and have been searching here on TH-cam. Does anyone know any great video, course or book about back doors? Thanks so much, have a great day everyone 😌
of course crash protection existed before crash protection strictly speaking they just decided to switch the on switch. The scarry part is that it's one thing for like crash force but strictly speaking it makes sense if you just want to protect the device or alternatively if you want to make sure that the device falls appart after a certain period of time and plan it's obsceleence crash detection is an excellent way to make sure also it can be used as a mechanism to void warrenties en masse been in a crash sudden jolt anything that could "damage" the device or if the sensor had a fault, in each case warrenty void. So it makes alot of sense that this would happen asides that old harddiscs[at-least servers and the likes] already had a form of crash detection that could detect incredibly high G forces in order to extremely abruply enter a protected mode to protect the harddisc while it's been jostled around or moving. [specifically turning off the hard disc and entering a protected mode when outside of it's operating parameters] this goes all the way back into iPod Era.
to be clear it comes from the preipods because first ipads had harddiscs inside of them meaning that the ipod already had a primitive form of crash detection simply to protect the device itself[as hard disc require physical movement] also you can test what i'm saying very easily you can buy portable disc player you can intterupt the physical meachanism by jostling it just enough to trigger it, and depending on how you move it it changes what the motor and other electromechanical controls are opperating[and it's not just gyroscope it specifically isn't working like a gyroscope it will literally dampen or slow down or go "read error" mode and stop writting data.
Good content, the only thing I don't agree with is that TikTok is dangerous because it's not just about data, it's like embedding a chip in your mind. If you live in the country that produces TikTok, you know what I mean. Google, at least it has some limit by law, TikTok has no limit, and it's the next level.
I know its only because google was listening for the word google, but as I was watching this my phone started listening to the conversation through my speakers and was visible it was doing it on the screen. I think they are on to you :D, the irony . Jokes aside I have a Pixel and will be using Calyx some point soon when I get time. Thank you for letting us know about this. I was not aware of such OS for pixel phones.
@@cringesh1t427 My phone screen was off, it came on and google appeared and was listening to the conversation. As if I had called google to listen to me, I'm guessing he said words such as Ok Google to make this happen. Just coincidence.
I understand some of the basics of security. My main question is, by teaching people how to be more hidden online, wouldn't this make it harder to catch the distribution of cp?
I think that Neuralink is a brain debugger port to solve the brain mystery from the inside! It was a B option in the case that the current AI(the mathematics model) will not perform well! But as we see throwing all that data in the machine works pretty well!
i found out from my analytic data that a family app is accessing my phone and data without me knowing about it. they can access ur phone and data without physically handling ur phone.
You just create a digital twin that watches, knitting videos, and cat memes, and quotes of Bernie Sanders. Then now and then you throw in some real searches.😂
"Interesting, our profile of this guy is that he spends a lot of time trying to trick our profiling AI with misleading actions... What do we do with that?" "He goes into the extra scrutiny watch list" 😂
@@craigslist6988 It was more of a joke than an strategy. But, you could do it in a way that would make you look common. Probably cat memes and knitting gets you on the list?😂
Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: Brilliant.org/DavidBombal
The machines are already tracking and watching you. And they're influencing you. The future looks bleak. Do you really want to live in a Skynet world?
I interview Rob Braxman - the Internet Privacy Guy. He's a public interest hacker and technologist. He uses his extensive knowledge of cybersecurity and tech to serve the public good. He cares about privacy. He warns you of digital manipulation, disinformation, mass surveillance.
// Rob Braxman’s SOCIAL//
TH-cam: www.youtube.com/@robbraxmantech
Website: brax.me/home/rob
GitHub: github.com/robbraxman
X: x.com/robbraxmantech
// Specific Video REFERENCE //
Is Skynet already watching you?: th-cam.com/video/To5Nbs6DmIA/w-d-xo.html
Neuralink a Weapon?: th-cam.com/video/1SMbvhXI6wk/w-d-xo.html
AI will deliver Utopia they say! Will it be an amazing world!? (Tongue in Cheek): th-cam.com/video/kJ3mkQ4wFdk/w-d-xo.html
Signet 2024: Infrastructure is Complete!: th-cam.com/video/9xPjIfJI5Jk/w-d-xo.html
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming Up
00:50 - Brilliant (Sponsored Section)
01:55 - Intro to Rob Braxman
03:31 - Explaining "Mesh Networks"
05:14 - The Internet Privacy Guy
06:30 - Apple Encryption Scanning
08:41 - Client Side Scanning
09:34 - The Evolution of AI
11:27 - TikTok Collecting Data
13:57 - Explaining the Predictions
16:20 - Client Side Scanning Laws
18:49 - Opinions on Neuralink
21:20 - What Feeds the AI?
22:25 - Google is the biggest threat?
26:45 - The Cookie Problem
28:12 - Social Platform Cookies
29:38 - Navigating Google Sites
30:23 - Cross Device Tracking
35:09 - Sending Data to The NLP
35:57 - Moving Away From Cellphones
38:24 - How to Navigate Computers
40:30 - Cellphone Software Suggestions
42:12 - Downloading Apps
44:51 - Receiving Notifications
46:09 - App Limitations
49:18 - VPNs & Search Engines
51:59 - The Threat Model
53:23 - Search Engine Recommendations
55:16 - Information on Jigsaw
57:36 - How to be Private Online
01:00:32 - Pseudo anonymity
01:02:09 - Rob's Last Words
apple
google
degoogle phone
degoogling a phone
ios
skynet
robocop
pine phone
privacy
online privacy
online privacy guide
internet security
tracking
online privacy for kids
online privacy and security
online privacy it doesnt exist
online privacy tips
online privacy ted talk
online privacy guide
online privacy for students
internet security tutorial
edward snowden
naomi brockwell
privacy
five eyes
5 eyes
brave browser
tor
protonvpn
protonmail
duckduckgo
google
online tracking
ios
android
graphite phone
privacy browser
privacy browser ios
privacy broke
privacy browser for pc
anonymous
hide online
hidden identity
hide identity online
data
hack
identity
internet
privacy
social change
technology
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#privacy #anonymous #hack
Yup 🪰✅
Thanks 👍🏻😮
how to hack wifi using evil twin attack ?
Just wanted to drop a short comment here;
I've known this for A LONG LONG time. Problem is got 5 Friends who don't.
So yeahh fun times ://
@@nizarchoukairi-vb7op Ehhhmm..
Oh man no way, so glad you brought Rob on the show!! He's the best!!
That's crazy the we both said "Oh man No way" the instant we saw Rob's face 😂
@@TheJCEguy Haha!
"Your VPN won't protect you" this is true for those who don't know how to use a VPN and how to seperate their own traffic. Browser isolation will probably not be enough either (if all your network traffic on that device is going through VPN tunnel), your identifiable traffic should NOT go through your VPN tunnel as that can then be associated with your 'anonymous' traffic, which essentially de-anonymises you - this is the main point of failure that newbies aren't aware of.
Teach us master
Could you possibly explain how to do that on a phone? Is it turning on incognito and not using our network but rather our lte or wtvr someone may have?
@@cringesh1t427 As an example, you could install something like cyberghost VPN and brave browser and use them together in a isolated way. In VPN app options you select split tunnel, and then select brave browser, so that only that app will go through your VPN tunnel (rather than system wide traffic, which would effectively de-anonymise you through IP association!). Once that is set up, you should only use brave for anonymous usage, i.e. not log into google or facebook etc! I say brave because it has good anti-fingerprinting/tracking features, and cyberghost I know has split tunnel feature.
Need this class
Well said, think of a VPN as a method of transport from home to a restaurant. The restaurant staff don't know how you got there, but know who you are!.
That's what happens when people use a VPN and log in to accounts. Some will use Tor and log in with real details!
Police have run a few VPNs, I found a WeVPN server on the IP range allocated to equipment on the 5th floor of a police station in Manchester UK only months before the company vanished with excuses. I think they had been exposed. Either it was a law enforcement project or a compromised server.
All VPNs and companies hosting the servers must provide access to all data by Law in the UK.
Not even protonmail is safe as encryption to their emails is added before and after it is stored on their system. That allows police access, also NSA and GCHQ access. It is only secure if you connect up via browser and send to another user on the system. Notice how they NEED phone numbers and emails for account recovery? I suspect the next Encrochat will be a VPN or Proton, maybe Tor - which we know can be deanonymised.
Nothing is private now. You have been photographed in your car for 25years and added to a database, the same when out shopping. Your Alexa and phone has even profiled your voice, banks can access voice databases and photo databases to check it's you.
Wow I’ve been watching your videos for years. Happy to see you have Rob on the show. Love how privacy focus he is. Love the amount of good content you and him put out.
Thank you for your support! I love getting a wide range of guests on the channel :
been watching rob for years ,first time here, saw robs face when i hovered over thumbnail !
David - you already hold a high level of respect, and the fact you finally have Rob Brax, massive EXTRA respect!! Been following Rob for years, and been a customer as well for many of his products. Thank you
I have been following Rob for a few years now. This man knows his stuff!! Thanks for having him on David.
Ive got a plan, just buying a dumb phone, disconnecting from the net from time to time, make my own downloaded information cache (offline), download LLM and run locally and talk to people like connecting in real life.
You literally have the most fascinating tech podcast out there, because it just doesn’t glorify technology. It’s more real. it kind of merges technology with the aspect of human nature, rather than painting some techno Utopian BS.
Your video titled VPN won't protect you was the video that triggered this contribution. I can't register to a monthly subscription now but this video is worth contributing.
Thank you! I appreciate that!
Love braxmans content and perspectives, hes spot on when it comes to AI and its why i dont run stock android or windows anymore
re tik-tok, I had understood the problem not to be that it's collecting data as stated here, but rather that what is collected is shared with the CPR gov't, and can be used to shape and manipulate the information environment of a sizeable portion of the US population. That's why they're not saying shut down Tik-Tok, they're saying sell it to a non-Chinese owned company.
Actually there are ways of shaping the thoughts of the US population by a foreign app provider. They can inject any kind of malicious message at any time or more subtle ones via videos. It's not good idea either way.
This is a very difficult subject. I was drawn in by the title of the video even though have not yet gotten a VPN. Watching this made me realize how much i am being tracked and by extension manipulated by, or rather, through my searching and browsing.
Google and Facebook mainly but also Microsoft and X (Twitter). Banks in UK will give Governments unfettered access to personal account info without any warrant if the amendments to the Data Protection and Digital Information Bill is passed and no doubt it will be fed into AI.
All European banks have obligation to comply with request of authorities and report amounts over those set in local legislation. Unfortunately money-laundering and tax-evasion has led us to this. Idk how it's done in US or elswhere. On a brighter note, personal data kept by companies is under strongest protection in EU than anywhere else to my knowledge. Truth is, if you want privacy, simply never put your life online on social networks, rest should be out of public reach. We can still be partly anonymous on this platform even with accounts, can't we? Actually nefarious powers (long story) are using this anonymity to attack us as much as own goverments use PII data to monitor and control the law.
After Snowden explained having a longer password is more secure. I noted that they started limiting the size of your password...
Rob mentioned, that mobile phones does not need a VPN. Why is that? You sit at an Italian café, you're on their wireless network and the local hacker sits in his van on the same network. Why is VPN not a good idea here?
problem is that the hacker never sits in a van
@@asdfqwerty5389 @davidbombal It really is a confusing remark by Rob. I've listened to it over and over, like Lt. Columbo would do, but to no avail. Why is VPN on mobile phone not a good idea? He mentioned IPv6, but how would that break the encrypted end-to-end VPN tunnel?
A VPN is no use, why use WiFi if you have 4G/5G?
Sites use HTTPS now, so it really does take someone really clever to spend time messing with your traffic.
The WiFi pineapple is not really useful and doesn't do what people think, the same as a Flipper will not enable you to steal cars!
I use a VPN to home , wireguard to a Pi with PiVPN and use OpenVPN with a router - only to stop work blocking sites! It also puts me out from my home IP, meaning I can watch TV, share files, use my bank etc.
Commercial VPNs are in lawless countries for a reason, so they don't need to protect your data and can sell it knowing you can't do a thing. They all have to supply your data to GCHQ and NSA and police too.
IPv6 uses a unique ID or address on each device, so this is identifiable anywhere like having a phone number, IMSI or IMEI. Again, it doesn't matter how you reached a site, it knows who you are.
With IPv4, you can change the device IDs and not everything is unique.
@@MicskiDK obviously he is Capping he sells a VPN service
Unfortunately many folks are so concerned with surviving and racing around that they have no clue this exists!
Snowden already warned us about this. It doesn't need to be A.I. controlled. All they need is your phone number, the network you're with, and by proxy the SIM card ID and pin. And then a government hacker can remote control your phone and see browsing history and app use history. And of course, see see all your contacts, messages, social networking, and of course they can get around the encryption of messages from WhatsApp and Messenger as they're viewing it through your phone as if it were a window. What's ironic with all this!? I guess the fact that you get charged on your phone contract for the data they use to stream your phone to them and encrypt the address so to cover themselves. 😂😂😂 xZx
I’d love to hear what you guys think about IEEE specifically 802.15.6 since it basically goes with the neuralink topic.
This is the intro extract if you’re unfamiliar;
The standard defines short-range, wireless communication in the vicinity of, or inside, an environment such as a human body, vehicle body or both, using the Ultra-Wideband (UWB) and narrow-band physical layer (PHY) and medium access control (MAC) to support enhanced dependability in human body area networks (HBAN) in the industrial scientific medical (ISM) bands and local medical regulations. The standard supports quality of service (QoS) and data rates up to 50 Mb/s and incorporates support for vehicle body area networks (VBAN). The standard specifies the coexistence of multiple piconets, including inter-body area network (inter-BAN) interference and inter-piconets interference, simple MAC protocol, and sensing and feedback control loop delay.
Definitely worthwhile checking out & while your there you may notice other frequency channels & there uses examples 802.15.4 & 802.15.3 ect…
It would be a great show to have it as a 3 tier view point of Rob, OTW & yourself
I have 2 VPN router’s .
If I want to connect two of them , in my house ( my normal router connecting with 1 VPN router and the second one connected with the first VPN ROUTER , like a train ) with 2 different 1 year a subscription not make in the same time WILL BE BETTER , MORE SECURE ?
Can you please answer me ?
Thank you very much .
Rob is correct on the privacy front and regarding the misuse of capability. If there is a computing/technological capability available to corporations or intelligence agencies, they will use it, and they will use it in such a way that user/device-owner rights to privacy and, indeed, ownership rights, will be harmed. In hacker terminology, these people want to sell you devices and software and to own those things at the same time. Preferably, they will be able to extract a subscription fee for the privilege of being owned and having your personal data stolen and sold on the open market.
Our governments encourage this, to give intelligence agencies and law enforcement the "tools" they need. Never mind that these agencies have long had far more access to data than they need. In exchange for stripping citizens of constitutional rights, tech-illiterate politicians have long given tech companies a blanket regulatory pass on their rapacious surveillance practices. So long, that is, as the key agencies get their "tools" - complete with GUIs for desk jockeys who do not actually hack anything themselves.
We need to be aware of all this stuff, in the first instance for our own dignity, but beyond that to change the political culture that has allowed this stuff to go as far as it has gone.
I despise smartphones. Every bank I deal with is starting to demand it, you can't set up an online account without one. Every business seems to be pushing it. I think the entire thing is nefarious but then I think all cars being various shades of gray or black is too.
How can i protect myself against keylogging?
I am using GPT for learning about many things, also fixing my PC and consulting steps. I am glad I didn't share my serial number with it, was quite weary sharing with them anything of this kind. Glad I was.
Braxmen seems like a fed selling honeynet phones. His solutions to evading tracking do not pass the sniff test. Using a different browser and not logging into your Google account does not evade Google. The user agent, GUID, ip address, and device sensor data all correlate your identity. It’s game over.
Whats a user agent, a gui and a censors data
Completely agree, his phones will not stop people being identified and located.
user name*, censor data is you laptop/phone is always recording a history of gps, towers, and wifi access points. that data is then sent as telemetry, to track and identify not only you, but where you’ve been, and who you interact with.
This was so interesting to watch, I am just still so puzzled about being anonymous on the web. It is so hard to sign up for anything nowadays without tying yourself someway some how, verification of email, phone number , etc ! I really am to the point is that I don’t mind being on the web and seen but I monitor all my things EXTREMELY to make sure I am not being taken advantage of AKA hacked. It’s just so hard to stay in the dark on the web nowadays if you are a regular user of the web, content creation, and the list goes on!
The best policy is to remember this... 'walls have ears' Big brother is watching you! 'They have all the resources they need to find ways to snoop on you'
it is getting that way, i actually fear my devices.
the naysayers say, "if you do nothing wrong what do you have to fear", my response to them is who determines what is right or wrong and will right or wrong always stay the same.
U can turn sensors off on ur Phone, u can find how on yt, it prevents most of the stuff
A VPN is only an internet anonymity ponzi scheme if I decide to cash out and sell the encryption protocols. But you will never know either way, so it's all good.
thank you for spreading the Message!
Location on any smartphone is ALWAYS on. Even when the phone is off. Until the "backup" battery is empty (~1 year).
How to tell everyone you've never disassembled a phone in one sentence.
@@incandescentwithrage 😁 - or read the output data in one line... ?
Wait until people find out about what the sim card does.
@@juanmondragon
do tell moar
If you can't see how a service is being paid for, then it is usually stealing and selling your private data. Personally I have no problem with law enforcement having access to my data - it is commercial people who want to make money from my info (usually my own money in the form of higher prices) that I really object to.
Ah, I LOVE Rob!! Love seeing him on your show! Great things come when great minds collaborate.
We are entering a 50 year period of darkness...
Pardon me, I read a book saying 800 years of darkness, since we are at the lowest period of Kali Yuga.
@@nacionaldelacapitalthe Islamists were in Europe for 781 years
@cheesium238much rather be a serf than a wage slave.
@@MangyPL You'd still have all the downsides of wage slavery but with the added bonus that it'd now be completely illegal for you to quit your job.
@water1374 Thats not how most serfs lived. They lived well and only worked a fraction of the time as a wage slave. Yeah, there were instances of badly treated serfs but it's blown way out of proportion
I’m in one of those people in that 10%!! I been following rob for a lil while now and I’ve learned slot!! But thanx to the both of u!! These vid are very helpful, educational!! Thanx again!!
Privacy goes even deeper when you dive into the sim card data that is sent
So, basically use a degoogled phone, or just stay away from the google browser and use browsers like firefox or brave.
thats touching on the tip of the needle sitting on the tip of the iceberg ...
Far left in the US today is a Reagan republican today. Far left in America is probably center right in Brittain.
There's a difference in disliking a political figure like Hillary or Ted Cruz, and saying they are traitors and should be locked up, or worse. It's far worse on the right, which is filled with a constant drum beat of violent rhetoric.
Despite my difference in political opinion with him, I enjoy and find his videos informative.
i mostly think cookies play a crucial role in storing the data which is something against the privacy
Cookie tracking is for basic website plebs now, fingerprinting is how all the real players do it... That's why they don't mind all the cookie blocking people waste time on now.
Very insightful and a realist outlook on tech in big corps without regulation in the future. Security should include privacy!
Long story short, vpn is good so your info won't get hacked through packet sniffing but your data is still being sold regardless if you use a vpn or not and this includes being on your home network. If you dont trust the network you are connected to or dont trust others on the same network then use a VPN!
Skynet 2024, produced, directed, starring . . . AI
😂
It's for our own good
@@nathanr7931 damn you're stupid
And the book 1984, made everyone relax, in 1984, so no one saw it coming . .
The book should be called 2014
@@nathanr7931 Sure.. keep telling ya self that.
great camera quality from both
feels goooood man
I search for all kinds of random crap. I get ads for young girls to old men and everything in between. You can't tell what I like and dislike easily because I appear to like things I don't really like. Most people only subscribe or thumbs up things they personally like. I throw a wrench in that.
When online. Boot from USB OS. When not online, go local.
That would give decent protection, but is not very practical since most of the stuff we do on computers nowadays is online.
There's a very steep jump in giving up privacy just to go from "Luddite living off the grid" to "security conscious but not considered a weirdo", that's why it's so concerning. You almoat have to abstain from tech to have privacy.
BTW, Qubes
Good content. However, regarding largest "public data" collectors. Yes Google, but what about TH-cam, they also hold and collect a lot of private data. How accountable are they, when it comes to privacy?
I don't use vpns for privacy ( i use it to go on pages google block ) and i'm a researcher been doing it for over 15 years my character is not what i search for i do it for analysis purposes
Why is it that if law enforcement want to tap a phone they need a warrent from the court, however companies like Google and Apple can tap into our phones with no warrent and zero knowledge or accept from the user /owner of the phone?! That is a very valid question to ask, I would love to see a video that investigate this further or take up this subject.
Those 'user agreements' that most people blindly click through provide the required consent for them to collect and monitor your activity on their platforms.
@@altologic I love to see a video that puts that agreement under the loop and translate exactly what we allow them to do, the case is that you have no choice but to agree, its not really an option to say No if you want your phone to start up.
...and DON'T THINK FOR A MOMENT that FLAW ENDORSEMENT need a warrant to install malware, etc. on your 'phone' if you are arrested for any reason & they got hold of it; in fact, They've got OTHER methods being used lawlessly/semi-legally.
They won't necessarily need your 'phone.'
Is ANYONE truly ready for the direction taken by this 'NEW' WORLDLY DIS- ORDER that I call the RUDE HURLED ODOR ??
So far, They just put the GUILLOTINES on your WRISTS; but, SOME things are only getting worse...at about the same rate as technology... such as THEIR 'psychology.'
❤ Y'all ! Peace...NOT OF this world. 😅
This vid reviewing it was still interesting its like a rethink tank.
I re-read some books several times re-pluggin lose ends.
Thanks guys keeps me mentally on rethinking research abilities.
one day i was looking through my mobile for everything related to location, (huawei) turns out there are system apps that's on(blue ticked) and grey out so it can't be disable, wifi, Bluetooth disabled, airplane mode on, doesn't matter you still get track through cell towers or satellite or whatever means they're using 🙄🤔
I don't know what's broke but something recently showed me that it's blue ticks now. Which I never used to. My bills jumped from .. like.. it jumped around 300 % ?.... I were robbed twice and I'm sure that my boss installed those cctv for deliberate filming ? Cos they bought like Chinese insurances as well. Which films everybody ?.... On top of my local healthcare. I'm sure somebody tried to drug me so that I get harmed... When you are poisoned... And no crime has been committed.... Every usage are paid fees...
I used to be firmly in the "I'm not doing anything wrong, so I'm not going to worry about it" camp. Now I'm starting to see the wisdom and importance of privacy as legislation like Roe v Wade has been overturned. Also, having a potentially skilled cyber stalker ect. I believe there's a recent news article where a man is trying to use state laws to follow a former partner across state lines with an investigation into an abortion. It's definitely an overwhelming process to start now, but slowly retraining myself 😅
WiFi already scans human movements and can create a three-dimensional model from it.
Terminator picks up smart pewpew.. *click*... "what a piece of trash" *fires up machining shop and proceeds to turn a black powder into a boomstik instead.*
Great show David. Guest was awesome! Keep it up.
These big companies can collect all the data they want on me. But the moment they sell or use that data to negatively affect my life, they can expect massive exposure and lawsuits from every person that uses there services.
What about hardware backdoors? Also I am thinking if they can completely scan your computer or smartphone, the value of encrypted and decentralized data is completely voided. Is there anything not true about this statement ? This is very important when you consider that financial things could then be compromised also.
The blue print for google to build a defense against any app store that is being used as a work around, is being provided here in this video. That is the only draw back with this video, the information that is being provided, will also be used as a weapon against the offense. TMI on a google platform:(
@2:56 not to take anything away from him, but, many IP watchers “predict” incoming tech and data comps link with corp recruiters to let the cat out of the bag on certain companies about to enter a new market by whom they are seeking to hire (quietly via recruiters).
11:30- The deal about Tiktok from what I've heard is not the amount of data being collected by who is being collected for and that appears to be the Chinese government. That's what seems to be the issue.
ROB is the 💣...so glad you 2 collaborate...
The only secure PC is the one that isn´t connected to internet in any way, and is under/in physical control, hands on.
The rest is only a vet dream.
TH-cam ad, a coming up bit, a personal ad read, another TH-cam ad. TH-cam is becoming insufferable.
Use Brave to stop the adverts :)
@@davidbombal thanks for the tip. I use Firefox and some plug in on my pc and it stops ads. On phone I use the app. I guess I should stop using the app, the adds on TH-cam have gotten so bad.
So my question is if VPNs can't protect us what will. And imagine all that data we've backup on Google. How can we go back to a 100% security and privacy.
Cause I remember at some point the was just typing words on my keyboard went to Google and Facebook then it brought that suggestions of what you may like. 😢😅😅
Then I started thinking do I have a keylogger on my devices
I guess I will get the flip phone I saw advertised for seniors as my next phone. Just need phone and texting anyway.
Most still have all the privacy issues built in and just don't show the user now.. Truly consumer hostile design
@craigslist6988 definitely! Most flip phones are just the original smartphones now.
i found out from my analytic data that a family app is accessing my phone and data without me knowing about it. they can access ur phone and data without physically handling ur phone. they can even switch ur carrier and clone ur phone
Honestly, I kind of like google maps tracking me while I drive. If I ever get accused of committing a crime I didn't commit. That gps tracking history might come in handy.
@@mikeschnobrich1807Are you REALLY worried about that happening to you ever..?
@@JosePerez-vt7zs
Better yet, ask Bryan Kohberger about that!!!
@@JosePerez-vt7zs
Better yet, ask Bryan Kohberger about that!!!
Holy crap! Worlds have collided David and BRAX!!!!
Skynet mix with universal solider lol welcome to the future ladies and gentlemen
"Run From It... Hide From It... Dread It... Destiny Arrives All The Same"...
it’s the unofficial developers who claim to be the official site or app
big fan of rob ! genius guy. never knew he did visits at other podcasts..
Google analytics is super scary! They collect everything!
that last info bit where you had the routers to "optimize" with ai
in general you will be traced no matter what
This maybe out of context but I bought a domain that can be used as to send invite. Very new domain and not even public yet. I just did a couple test on my own email. Not a day went by and my hosting company contacted me that this corporation wants me to take down the domain as it contains their name and identity. And that I have less that a day before they take it down. I have paid for this domain already, what should I do with it? What are my options here.
NEURALINK is hardly Musk's idea..
It was the goal in the award winning game WARZONE 2100 (1999), which after implementing it, put humans in a suit, where they could steer the suit with its mind... (lots of servos in the suit, make you run as fast as a bike)
Is this where the hacked SSN went to skynet in April of this year.
There is absolutely no way you can cover your tracks. Your data goes from your phone immediately to the Internet provider and that provider keeps track of everything as well. Google and all these other companies also collect every drop of data from your phone. And he is right when they stopped allowing you to take batteries from your phone is the day they started tracking your phone even when it was powered down. Everything you say and everything your camera sees at all times are recorded in the database somewhere.
Very good interview with Rob Braxman. I follow Rob since a few years now and this interview touches on a myriad of the usual Braxman-topics. Very comprehensive! 👍
"I predict things", "Yeah" i heard you the first time
Two of my favorite tech guys!
When can we start talking about these topics on a more detailed level? I’m so far ahead of this type of content. I don’t allow syncing of any type, no location services, anonymously browsing, no peripheral permissions, no background apps, uninstall unnecessary programs, disable API’s, modify registry lines, manually install updates, only use windows local accounts, never sign in under Microsoft accounts, use GPS Scramblers, I even run 950nm infrared LED’s on the rear of my car to blind traffic and security cameras….I’m already doing everything you’re suggesting and have been for years. We aren’t simpletons…this man isn’t predicting anything here. I have never worked in IT and somehow “predicted” way beyond what Rob is talking about. Don’t buy his product, anyone can install a custom OS with the information available online. I run a custom windows 10 installation which I created myself and it’s DE-WINDOWED WINDOWS lol. For free.
I guess you can understand that there are people out there who find this content interesting. I don't see sciencists commenting on quantum physics videos just to say that this is too basic and we should go deeper ... that would be absurd 😂
Never. Cause of *Backdoors* & NationState *Hackers*
Well...People like Me are not worried, nor do I know sh_t about most of the terms He or others use;however, It's the obvious surveillance age topic matter that I could probably have predicted far ahead of you and others who are tech- savvy wizards/knowers. So, BE NICE ya know-it-all(s).
P.S. If you're 'driving' that car around AT ALL, the tyrant 'traffic law' can still make all your Constitutional & UNALIABLE HUMAN/Civil 'Rights' go BYE-BYE in a heartbeat...and IMPOUND your car...and SEPERATE you from Family/Friends/food/tech. etc. [maybe take your head off]...and RE-PURPOSE all your better stuff through asset forfeiture. I hope & pray not; but, It never pays to be over-'wise!'. If so...GOOD LUCK.
As far as him thinking, the January 6 people would not have been caught. Had they had a D Google phone, is incorrect. Because the phones of the other people will capture video of you and your face is already saved in the Google database and they know exactly who you are. And phones are absolutely everywhere. Cameras are too. Cameras on the stop lights track you as well.
I am fairly new to cyber security and info sec although I do have a computing background (many , many years ago). Even as a newbie I love watching your videos & your channel. I’ve learned so much about vulnerabilities, exploits, & hacking tools. This is a great video 😁 I’d love to learn more about backdoors and have been searching here on TH-cam.
Does anyone know any great video, course or book about back doors?
Thanks so much, have a great day everyone 😌
Interesting things to think about.
I didn't realize the google ID can follow you by loading it on other pages and looking for it on my devices.
of course crash protection existed before crash protection strictly speaking they just decided to switch the on switch.
The scarry part is that it's one thing for like crash force but strictly speaking it makes sense if you just want to protect the device or alternatively if you want to make sure that the device falls appart after a certain period of time and plan it's obsceleence crash detection is an excellent way to make sure also it can be used as a mechanism to void warrenties en masse been in a crash sudden jolt anything that could "damage" the device or if the sensor had a fault, in each case warrenty void.
So it makes alot of sense that this would happen asides that old harddiscs[at-least servers and the likes] already had a form of crash detection that could detect incredibly high G forces in order to extremely abruply enter a protected mode to protect the harddisc while it's been jostled around or moving. [specifically turning off the hard disc and entering a protected mode when outside of it's operating parameters]
this goes all the way back into iPod Era.
to be clear it comes from the preipods because first ipads had harddiscs inside of them meaning that the ipod already had a primitive form of crash detection simply to protect the device itself[as hard disc require physical movement] also you can test what i'm saying very easily you can buy portable disc player you can intterupt the physical meachanism by jostling it just enough to trigger it, and depending on how you move it it changes what the motor and other electromechanical controls are opperating[and it's not just gyroscope it specifically isn't working like a gyroscope it will literally dampen or slow down or go "read error" mode and stop writting data.
Can we get illustrated version were most important points addressed, i cant watch an hour , well be glad sir Bombal❤
Good content, the only thing I don't agree with is that TikTok is dangerous because it's not just about data, it's like embedding a chip in your mind. If you live in the country that produces TikTok, you know what I mean. Google, at least it has some limit by law, TikTok has no limit, and it's the next level.
A problem i encounter (Daily) is a *State* (our Nation) that loves *Social media*
Where as I don't.
FYI; I use less than 5 of em
However i Digress.
Good luck tapping my C64 and VHS recorder to skynet :P
do you have preference for best antivirus software which also keeps privacy?
I know its only because google was listening for the word google, but as I was watching this my phone started listening to the conversation through my speakers and was visible it was doing it on the screen. I think they are on to you :D, the irony . Jokes aside I have a Pixel and will be using Calyx some point soon when I get time. Thank you for letting us know about this. I was not aware of such OS for pixel phones.
What do you mean it was visible? Did Google get activated is what you mean? Sry idk what pixel phones are now how they work tbh
@@cringesh1t427 My phone screen was off, it came on and google appeared and was listening to the conversation. As if I had called google to listen to me, I'm guessing he said words such as Ok Google to make this happen. Just coincidence.
I understand some of the basics of security. My main question is, by teaching people how to be more hidden online, wouldn't this make it harder to catch the distribution of cp?
Greetings: 32:15- Still logs location even if unit is off. Such is why manufacturers have made batteries non-removable.
I think that Neuralink is a brain debugger port to solve the brain mystery from the inside! It was a B option in the case that the current AI(the mathematics model) will not perform well! But as we see throwing all that data in the machine works pretty well!
I have never used an iphone nor will ever
i found out from my analytic data that a family app is accessing my phone and data without me knowing about it. they can access ur phone and data without physically handling ur phone.
A definite must watch!!
Thank you, guys.
Just sighnt up for Brilliant. I hope it gone help me programming.
You just create a digital twin that watches, knitting videos, and cat memes, and quotes of Bernie Sanders. Then now and then you throw in some real searches.😂
"Interesting, our profile of this guy is that he spends a lot of time trying to trick our profiling AI with misleading actions... What do we do with that?"
"He goes into the extra scrutiny watch list" 😂
But then the Google cookies will figure it out😂.
@@craigslist6988 It was more of a joke than an strategy. But, you could do it in a way that would make you look common. Probably cat memes and knitting gets you on the list?😂
So what's the best way to protect online
Thanks so much David
Lol…get a good antivirus and firewall 🤣🤯🤕
Linux, TOR, Privacy DNS service, Ublock origin, Virtual Machine, immutable OS, open source software.
I guess.
Buy a burner phone or laptop don’t put your personal information in it