How To Become Invisible Online

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 พ.ค. 2024
  • How To Browse The Internet Anonymously
    The first 1000 people to use the link will get a free trial of Skillshare Premium Membership: skl.sh/kallehallden05211
    Get access to my programming courses: / hallden
    Follow me on instagram: / kallehallden
    LiveCoder channel: / @livecoder7639
    "Clean Code Friday"
    If you want to receive one short email from me every week, where I go through a few of the most useful things I have explored and discovered this week. Things like; favourite apps, articles, podcasts, books, coding tips and tricks. Then feel free to join kalletech.com/cleancode/
    CONTACT: contact@kalletech.com
    Follow me on:
    TWITCH: / kallehallden
    INSTAGRAM: / kallehallden
    TWITTER: / kallehallden
    GITHUB: github.com/kallehallden
    DISCORD: / discord
    PATREON: / hallden
    VIDEO EDITOR: editingmachine.com (use coupon code KALLE to get 50% off your first month)
    --------------------------------------------------------------------------------------------------------
    GEAR:
    kalletech.com/tech/
    00:00 intro
    00:55 Level 1 Anonymity
    03:33 System For Password Creation
    05:53 System For Storing Passwords Safely
    09:10 Restrict What You Reveal About Yourself
    10:10 Create Multiple Emails
    12:51 Level 2 Anonymity
    12:59 How To Hide Yourself Online
    14:48 How The Tor Web Browser Works
    15:35 Use Encrypted Messaging
    16:38 Become Invisible Online
    17:37 The Tor Exit Node Problem
    18:35 What is a Proxy?
    19:18 Create Your Own Proxy
    20:06 Become The Proxy
    21:30 Creating An Anonymous Gmail Account
    23:07 Conclusion
    This video was sponsored by Skillshare

ความคิดเห็น • 2.6K

  • @Hallden_
    @Hallden_  ปีที่แล้ว +104

    Here is my other channel with nature related content: youtube.com/@halldenlogs3445

    • @sumrandomguy4860
      @sumrandomguy4860 ปีที่แล้ว

      Hey, I got a quick question. Does it make sense to use both a VPN and Tor browser at the same time?

    • @mrcx6142
      @mrcx6142 ปีที่แล้ว +1

      My issue with password managers is always - how secure are they? If they get busted, all of my passwords are, that's my thought process.

    • @darkones4370
      @darkones4370 ปีที่แล้ว

      @XfxPro650W heard the same before. Is Mac better overall?

    • @Plastik13
      @Plastik13 ปีที่แล้ว

      @@sumrandomguy4860 VPN is worthing 0 because if the VPN company gets served with a warrant, they will have to comply and give your own personal IP address.

    • @deadlyhacker991isback
      @deadlyhacker991isback ปีที่แล้ว

      youtube.com/@deadlyhacker991isback

  • @engboy69
    @engboy69 3 ปีที่แล้ว +9959

    Now I can be as invisible on the internet as I was in high school

  • @removedaccount6863
    @removedaccount6863 3 ปีที่แล้ว +7606

    He didn't only tell us how to be anonymous.
    He also taught us the basics to be safe on the internet that most of the people don't know about.

    • @kenshin5727
      @kenshin5727 3 ปีที่แล้ว +10

      HAIII BABUNIII YOU ARE RIGHT

    • @removedaccount6863
      @removedaccount6863 3 ปีที่แล้ว +31

      @@abhisheksathe123 I just kept it Short Brother.
      You should understand it. Overall tryna act cool is not good bro. I know what the title says. I ain't high. And I ain't telling something bad brother.
      Thank you.

    • @removedaccount6863
      @removedaccount6863 3 ปีที่แล้ว +2

      @@kenshin5727 Awww Honey bun amal babuni taa!! ALIGATOUUU!!

    • @removedaccount6863
      @removedaccount6863 3 ปีที่แล้ว +1

      @thefallenshadow why you ask? Yeah obviously

    • @69axfahmid82
      @69axfahmid82 3 ปีที่แล้ว +5

      @@abhisheksathe123 STFU

  • @ethanpatrick
    @ethanpatrick ปีที่แล้ว +30

    "I can remain unseen if I wish, but to disappear entirely: That is a rare gift." - Aragorn

  • @wakeupuk3860
    @wakeupuk3860 2 ปีที่แล้ว +373

    Been in IT since 1982 and in theory this is an excellent video and I commend Kalle for doing so especially unlike a good deal of IT TH-camrs on here, who mainly want to show off, get attention and aim for sponsorship plus he does not hide it requires having the knowledge, effort and time to do so. Unfortunately as is with so many IT professionals I taught in my time, simply can't grasp that non IT people just want to 'use' IT to do what they want, as oppose spending additional time and effort in being able to do so. That is why even though we have so many utilities and techniques to make passwords more secure, people as I even do (and I used to teach security) now keep a small book with them all written down as we have to change them on an irregular basis. Just like a neighbour I once had, who never actually used his car (driving his wife mad) as he was always tinkering with it, in his garage, to make it run better. The other thing is that most users who wish to use all the aspects of the Internet now find to do so, have to abide by the rules, wishes and requirements that are for the benefit of the provider not the user. A classic example is how banks have totally reversed the relationship, where once customer was king to them now. Kalle's suggestions are valid but most major websites know this and have paid IT software and hardware developers to creat 'hoops' that we must jump through to use them which if you have sensibly carried out what Kalle has stated you 'AIN'T GETTING IN'.

    • @jum5238
      @jum5238 ปีที่แล้ว +44

      There's another couple of aspects he doesn't cover. Tracking by apps, and cross-correlation of your information with other people. For instance, how many people have your phone number, and have entered it into their phone listings? And do they have utilities and apps that they use to make their lives easier and allow them to share their phonebooks with them? Or their contact lists for email? What about apps that you may have in common with your burner phone and your normal phone, despite not having them on in close proximity to one another? Oh yeah, there's also an algorithm that is used by intelligence services that correlate one phone turning off and another one turning on in close proxmity both spacially and temporally (time). And what about patterns in common? Do you have a group of sites you like to visit and are used on each phone/computer? Would your browsing history get scraped by malware? Do you pay bills online for utilities locally near you? Have you noticed that credit card transactions require phone numbers? And license plate readers and facial recognition, as well as gait tracing (the way you walk) can be used to identify you under a ubiquitous surveillance environment. Some interesting concepts covered in the show "Person of Interest" where the surveillance of everyone is a goal by intelligence agencies.

    • @justanotherhuman3668
      @justanotherhuman3668 ปีที่แล้ว +1

      @@jum5238 how would you get around that?

    • @Skaggs666
      @Skaggs666 ปีที่แล้ว +16

      @@justanotherhuman3668 here's what I've (hypothetically would) have done over the years to avoid those exact techniques @Ju M mentioned:
      my phone had a pretty predictable pattern. At 10PM it would enter quiet mode and that silenced notifications and I'd typically put on a UFO doc to fall asleep to. So from the outside looking in, I was asleep.
      I always used burner laptops/phones/hotspots to conduct business and swapped them out frequently. Laptop had Tails (no Windows/MacOS/etc). I never downloaded Tails from a machine or browser account linked to me and always used a fresh download on a new USB every time I swapped laptops. Some will say that is overkill. I would retort that person never took a 500-600 computer forensics course.
      Business was always conducted during sleep mode and I left my smartphone at home and went to truck stops (Flying J, Loves, TA, etc). My burner never got turned on until I arrived. Obviously I was using TOR unless the latency was too much for what I was doing at the time was rare but did happen. I'd never stay longer than 2 hours even if I wasn't done. I'd go to the next truck stop if time ran out.
      I went to well traveled truck stops, ones that were busy all night long. The more crowded the better. I had a coin and dodecahedron (D12) dice that I'd flip/roll to determine which of the 24 truck stops I frequented within 150 mi of my house I'd be going to. Heads was the number on the die, tails was 2x the number. I did that so no pattern could emerge and I never went inside to buy anything or go to the bathroom nor did I buy gas.
      All the BTC I used came from Local Bitcoins (RIP). This was long before Monero. Before BTC, it was forums like Shadow Crew and trust lol.
      Hypothetically.

    • @netsaosa4973
      @netsaosa4973 ปีที่แล้ว +4

      ?

    • @smokeygaming3565
      @smokeygaming3565 4 หลายเดือนก่อน +2

      Yip yap i aint readin allat

  • @primorock8141
    @primorock8141 3 ปีที่แล้ว +1826

    This video went from basic internet safety to getting away as a crime boss real quick...and I like it!

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว +32

      he forgot to mention the Tails OS and Prism laptops

    • @thahrimdon
      @thahrimdon 2 ปีที่แล้ว +16

      @@satoshinakamoto7253 Tails is the GOAT one of those things where if you know, you know

    • @weikopan2036
      @weikopan2036 ปีที่แล้ว +1

      Wait ! you forgeted tor and proxy server

    • @Mikey-yo9ue
      @Mikey-yo9ue ปีที่แล้ว

      @@thahrimdon that’s the one with flash drive?

    • @thahrimdon
      @thahrimdon ปีที่แล้ว +1

      @@Mikey-yo9ue Yessir, a lot of them are usually with removable media but you are correct.

  • @mikeoxlong4043
    @mikeoxlong4043 3 ปีที่แล้ว +2386

    Plot twist: he is a government agent making it easier to track us

    • @RS-xx8gz
      @RS-xx8gz 2 ปีที่แล้ว +17

      It is

    • @Drake-E
      @Drake-E 2 ปีที่แล้ว +5

      duh

    • @TooooooooooNify
      @TooooooooooNify 2 ปีที่แล้ว +143

      he didn't even like your comment like everyone else that made it to the top. you might be onto something.

    • @theencryptedpartition4633
      @theencryptedpartition4633 2 ปีที่แล้ว +18

      You gotta go to China or Singapore or Hong Kong and wear mask, and you will just look like anyone on the street. No racism, just saying. I am Asian myself. When I wear Clark Kent Glasses, no one recognizes me and some mistake me with other person.

    • @mukulsharma5738
      @mukulsharma5738 2 ปีที่แล้ว +12

      no he isn't ..but looks like you are ..now that's a good plot twist!~!

  • @AUSTINREAL-gk7xc
    @AUSTINREAL-gk7xc 2 หลายเดือนก่อน +1

    I needed the part three of your video .
    Thank you soooo much

  • @mht5875
    @mht5875 ปีที่แล้ว +10

    It is so important to police yourself online - never use your real name anywhere, never post a photo of yourself, never give out your exact location. If you use social media, again, use a "sounds like a real name", keep everything turned to Private.

  • @ariannagaskins2306
    @ariannagaskins2306 3 ปีที่แล้ว +1228

    Just wanna say I appreciate that Kalle keeps in a lot more of his verbal mistakes and even jokes about them at times. Definitely makes him a lot more personable and he comes off a lot more relaxed. He’s come a long way!

  • @user-ew5vj1sl1u
    @user-ew5vj1sl1u 3 ปีที่แล้ว +363

    Wow, multiple book level knowledge condenced into a 24 min video. Absolute legend.

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว +2

      he forgot to mention the Tails OS and Prism laptops

    • @Void_from_Abyss
      @Void_from_Abyss ปีที่แล้ว

      @@satoshinakamoto7253 what are they? Please briefly explain

    • @ABC-jq7ve
      @ABC-jq7ve ปีที่แล้ว

      You’re spelling your name wrong in Japanese. You need a う after the りゅ if you want your name to say “Ryu”. Also note, using hiragana will make you look more like a preschool child or a teenage girl than an adult. But if you make it kanji, the Hayabusa part is already kind of cringey, so it will make it look even more cringe. I’m Japanese. You’re welcome.

    • @SADS-hm3qe
      @SADS-hm3qe 8 หลายเดือนก่อน

      wtf@@ABC-jq7ve

  • @3dinterface68
    @3dinterface68 ปีที่แล้ว +76

    Couple things not mentioned is to shut off your telemetry data inside your OS. Normally a stealth system requires this and should read "Your system has achieved a perfect "TruStealth" rating. Not a single packet - solicited or otherwise - was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice." You can also shut off netbios over tcpip in your adapter settings so you are not broadcasting, and hiding your ssid so you are not broadcasting your connections name through wifi discovery.

  • @Dre_GadgetCravesNmore
    @Dre_GadgetCravesNmore ปีที่แล้ว +11

    Am not gonna lie, i sat and watched this whole video and this guy spoken everything pertaining to becoming truly invisible online. He didn't miss anything out, this is literally the sauce explained yo👏🏼👏🏼👏🏼 well fu*king done❗️

  • @giosaia
    @giosaia 3 ปีที่แล้ว +805

    10 year olds that feel like being a hacker would be awsome be watching this vid over and over. 😂

    • @RohakGaming
      @RohakGaming 2 ปีที่แล้ว +7

      @@kallehalldenassistant7578 didnt ask dont care

    • @Miloeren12
      @Miloeren12 2 ปีที่แล้ว +3

      Awsome

    • @jurivjerdha2467
      @jurivjerdha2467 2 ปีที่แล้ว +1

      @@RohakGaming with that profile pic the only thing you do is ask and care for other peoples stuff

    • @RohakGaming
      @RohakGaming 2 ปีที่แล้ว +2

      @@jurivjerdha2467 it was a bot who was promoting a fake scam link. Would you not say anything?

    • @jurivjerdha2467
      @jurivjerdha2467 2 ปีที่แล้ว

      @@RohakGaming oh now that i reread who you @ and how his comment isn't available it makws sense. Thought you said "didnt ask dont care" to the first main comment .

  • @AwokenEntertainment
    @AwokenEntertainment 2 ปีที่แล้ว +220

    It's crazy how much privacy people give up for convenience..

    • @silentking5080
      @silentking5080 2 ปีที่แล้ว +29

      Not really i don’t care if business have my information they have millions of others also I’m not some dark web hacker so I don’t need that much privacy

    • @atroxiv
      @atroxiv 2 ปีที่แล้ว +3

      Yeah bluntly speaking I don't care if someone knows my name/ where I live as long as they 1) obtained that information from me. 2) are not freely giving it out / selling it. 3) have it stored in a secure manner.

    • @kon6492
      @kon6492 2 ปีที่แล้ว +32

      @@atroxiv but they are not safely stored and are selling it

    • @atroxiv
      @atroxiv 2 ปีที่แล้ว +2

      @@kon6492 Most of them safely store it, I dont give it to those that have a history of breaches etc. And I also dont give sensitive information to companies that dont promise to not sell it.

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว +1

      he forgot to mention the Tails OS and Prism laptops

  • @Mohammad_Ali__
    @Mohammad_Ali__ 2 ปีที่แล้ว +48

    It is tough to prevent data being tracked and hide info. Literally just whatever it may be related to the person (especially personal information) that is used for any purpose can blow one’s personal information and status. So far this is the best video I’ve seen and one of the many that is useful which I learned from.

  • @mikeoxweld8604
    @mikeoxweld8604 ปีที่แล้ว +5

    Nice upload, succinct yet easy to follow....
    Highly recommended for anyone else with a short attention span or others who may have naively spent years feeling they have nothing to hide.... subsequently allowing many years of social-media voyeurism erode any belief in, or concerns for online privacy in 2022.
    Much appreciated!

  • @ShinyEmeraldGames
    @ShinyEmeraldGames 3 ปีที่แล้ว +644

    Really great and helpful video. Online anonymity has become more and more important for me over the last couple of months.

  • @markksantos
    @markksantos 2 ปีที่แล้ว +597

    Can you show us how to remove ourselves from all these websites that show your address, phone number etc...?

    • @Brukrex
      @Brukrex 2 ปีที่แล้ว +58

      Impossible

    • @TaioCruizeVEVO
      @TaioCruizeVEVO 2 ปีที่แล้ว +37

      unless your name is Harold Finch you will not be able to do it ;)

    • @jovan0454
      @jovan0454 2 ปีที่แล้ว +25

      Don't give them that information

    • @MaoYu23
      @MaoYu23 2 ปีที่แล้ว +24

      You have to do it one by one, it's not easy, but it's possible, i did it and i feel so free now !

    • @xE92vD
      @xE92vD 2 ปีที่แล้ว +16

      You can issue a case if the website put your personal information without your permission

  • @seekthuth2817
    @seekthuth2817 ปีที่แล้ว +14

    Extra added layer of security you can add to your passwords is to have your passwords in a foreign language, like Spanish or (romanized) Chinese. The further from your mother tongue and the less popular, the better. Good example is to find a band like The Hu that sings something like Mongolian, use a romanized version of a line from one of their songs, and then encrypt it.

    • @MTyler8787
      @MTyler8787 ปีที่แล้ว +1

      I wonder what this guy’s password is..

    • @what.anything
      @what.anything ปีที่แล้ว

      that's a good idea sadly most sites allow only english.

    • @seekthuth2817
      @seekthuth2817 ปีที่แล้ว +4

      @@what.anything Yeah, that's... that's why I said use a romanization of your specific language. I'd be shocked if a website allows you to use 咖啡因眼淚 as a password, but you can just use the pinyin for it, "kafei yin yanlei" and then encrypt it by changing like the K, and the N's to like a 7 and some #'s. Can do this with basically anything you want to just by going to Google translate (its inaccuracy being a benefit here) and writing down the Roman letters it puts for the pronunciation aid. It's super easy, though I would recommend putting it on a piece of paper just in case Google fixes a blunder it made that just so happens to Thanos snap your password out of existence.

  • @Cardboardbox83
    @Cardboardbox83 10 หลายเดือนก่อน

    I REALLY LOVE this video, explains everything I’ve really wanted to know and extra I didn’t even think about

  • @andreagualandris2462
    @andreagualandris2462 3 ปีที่แล้ว +31

    really great video as always! I love how you trigger the interest with some general interesting thumbnail and proceed to explain it in detail in the video. Keep up the good work man! Love from Italy

    • @kallehalldenassistant7578
      @kallehalldenassistant7578 2 ปีที่แล้ว

      Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,...... ,,,,,

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว

      he forgot to mention the Tails OS and Prism laptops

  • @mohamedirfan2816
    @mohamedirfan2816 3 ปีที่แล้ว +4

    Analogies are on an another level 🔥

  • @Pianodaddyy
    @Pianodaddyy ปีที่แล้ว

    Super excited to listen to this!

  • @HALEKSS686
    @HALEKSS686 ปีที่แล้ว +1

    thanks for the tips man !
    nice job

  • @thehariskhan
    @thehariskhan 2 ปีที่แล้ว +3

    You taught us the whole thing to be anonymous. Your all videos, vlogs are amazing 😍. I'm in love with your content.

  • @jamescarter5466
    @jamescarter5466 3 ปีที่แล้ว +4

    I've had a crap week, but you saying "visable" is just making me smile, this is why I love your content !

  • @ybsparky8484
    @ybsparky8484 2 ปีที่แล้ว +4

    Amazing video, very well put together. Keep it up :)

  • @Cobra-yo7fx
    @Cobra-yo7fx 2 ปีที่แล้ว

    I found this channel and this video from the main page of TH-cam on the safari version on my iPad Pro! Nice video!

  • @internetgurutv
    @internetgurutv 2 ปีที่แล้ว +7

    No one is safe online.. But good thing there are online angels like you. Thanks for sharing these tips 😊👍

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว

      he forgot to mention the Tails OS and Prism laptops

  • @freezbreez8731
    @freezbreez8731 2 ปีที่แล้ว +13

    This Is The Man I Have Been Searching To Mentor Me.
    Hail Kalle Hallden🙌🏼🖤

  • @natek3954
    @natek3954 2 ปีที่แล้ว +1

    This is great! Thank you for sharing!

  • @JeffriAbdullah
    @JeffriAbdullah 2 ปีที่แล้ว

    Fantastic video Kalle - keep doing the ice baths they put you on fire!! I have always wondered about how to do this.

  • @rbq426
    @rbq426 3 ปีที่แล้ว +3

    Wow, I'm overwhelmed and impressed!! Thank you

    • @kallehalldenassistant7578
      @kallehalldenassistant7578 2 ปีที่แล้ว

      Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,,,.......,,,,,

  • @matteocassino3172
    @matteocassino3172 2 ปีที่แล้ว +5

    Unsurprisingly it ends up like Kevin Mitnick's: The Art of Invisibility. Well done! Hope to see more of this well presented content.

  • @ahmed-osama2022
    @ahmed-osama2022 ปีที่แล้ว

    Great video,
    and Everything is very great, the explaination, the Editing of the video and everything,
    thanks a lot from Egypt

  • @MaxMitchell
    @MaxMitchell 3 ปีที่แล้ว +26

    I really like this new format of videos you've been doing (like the NFT video) - while they're longer they're also a lot more informative and I feel like I've learned something after watching.

    • @kallehalldenassistant7578
      @kallehalldenassistant7578 2 ปีที่แล้ว

      Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,.....,,,,

    • @rickastley-729
      @rickastley-729 2 ปีที่แล้ว

      @@kallehalldenassistant7578 Thank You Assistant! 🙏

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว +1

      he forgot to mention the Tails OS and Prism laptops

  • @AEPHEMERIAL
    @AEPHEMERIAL 3 ปีที่แล้ว +26

    Here we go!

  • @linuxjodi4311
    @linuxjodi4311 ปีที่แล้ว +1

    You mentioned keepass!❤️
    Subscribed..

  • @GKNaidu-hb5zv
    @GKNaidu-hb5zv 3 ปีที่แล้ว +279

    you should definitely make a video on setting up a proxy by ourselves at public wi-fi's..like starbuck,stations,etc...

    • @micropanda7916
      @micropanda7916 2 ปีที่แล้ว +19

      @@kallehalldenassistant7578 Lmao you seriously try to lure people into scam using channel that is about tech? (I mean, u probably won't answer cus it's bot but still lmao)

    • @aguiar.8181
      @aguiar.8181 2 ปีที่แล้ว +2

      @@micropanda7916 ?

    • @aguiar.8181
      @aguiar.8181 2 ปีที่แล้ว +9

      @@micropanda7916 just because someone doesn't have any videos doesn't make them a bot...

    • @warzone2620
      @warzone2620 2 ปีที่แล้ว

      @@happystarthe3rd hm not really u can just duel boot kali or whatever os u want. its what I do

    • @happystarthe3rd
      @happystarthe3rd 2 ปีที่แล้ว

      @@warzone2620 Yeah but for people new to this stuff is probably scarier and they feel safer using a virtual machine

  • @wisniapilkarski
    @wisniapilkarski ปีที่แล้ว +5

    I have never seen such a professional and transparent video in my life

  • @d.Cog420
    @d.Cog420 ปีที่แล้ว +2

    A couple of other ways: post letters; communicate with people by going to see them; shop by going to local stores; bank by going to the bank (if there are any left); grow what you can (salad stuff is easy and you can even grow it in an apartment); slow ourselves down, get off the click-shop, rebuild communities. Get on two wheels to move around: scooter for short distance, then pushbike, e-bike, motorbike. All good for the planet and us (careful on the motorbike). The internet has only been around for a tiny amount of time yet we now spend all our time on it (like me now). We could try getting out a bit more. Might be good for our mental health too as well as physical. For all internet uses though, do what Hallden says.

  • @collinloretitsch4731
    @collinloretitsch4731 2 ปีที่แล้ว

    Daammmnnn!!! Awesome video!!! This must be the dude behind the scenes running "silk road". Lol....seriously though. Great video

  • @landanrainey7072
    @landanrainey7072 3 ปีที่แล้ว +13

    The longer videos are amazing! you’re such a good editor and great speaker

    • @kallehalldenassistant7578
      @kallehalldenassistant7578 2 ปีที่แล้ว

      Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}........,,,,,,,....

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว

      he forgot to mention the Tails OS and Prism laptops

    • @bringbackdislikes3195
      @bringbackdislikes3195 2 ปีที่แล้ว

      @@satoshinakamoto7253 Nobody asked

  • @FREAKERKNOWS
    @FREAKERKNOWS 3 ปีที่แล้ว +5

    looks like this will help me a lot! THANKS, Kalle!

  • @domwick720
    @domwick720 ปีที่แล้ว +1

    informative and nuanced did his research and gave layers of op sec- good vid

  • @guruoo
    @guruoo ปีที่แล้ว

    I like your layered approach to online opsec.

  • @CR4T3Z
    @CR4T3Z 2 ปีที่แล้ว +3

    No caps, no numbers, 6 digits 13 year old password, still works to this day and never rest
    And it's such a simple word

  • @StonedNoob
    @StonedNoob 2 ปีที่แล้ว +24

    This went from 0 to 100 real quick 😂
    Like from tips to be secure on the net to outright being a cyber criminal. Like tips on how hide your face and stuff lmao

    • @atroxiv
      @atroxiv 2 ปีที่แล้ว +4

      Hide your face, steal bandwidth and power from the local starbucks et al.

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว +1

      he forgot to mention the Tails OS and Prism laptops

  • @Hungrymage
    @Hungrymage 2 ปีที่แล้ว +1

    I used a password system where you think of a word and just add the date of that day in front and the state you're in(as in drunk, happy, sober, etc). This worked for me so far

  • @joojlejoojle1438
    @joojlejoojle1438 2 ปีที่แล้ว +1

    The video is great!
    Just want to add that you can create Gmail accounts without phone number. On signup on a new (or after factory reset) Android device, while setting up, you can create a gmail ID without giving a phone number.
    Also temporary disposable email accounts can be of great help where you only need to create account and use only once

  • @leesweets4110
    @leesweets4110 ปีที่แล้ว +5

    I used to do my passwords like you describe. I had a handwritten list of 1/3-passwords for every site or service. Another 1/3 of the password was derived from the hostname or domain name of the site, and the last 1/3 of the password was a constant I had memorized. I had a mental algorithm for mixing them together.
    Then I found a better way. I just had raw passwords written down for each site. I would then truncate its 256 bit hash down to size, and use that as a high entropy "random" alphanumeric password.
    Then I discovered offline password manager. Their database is encrypted with a main password (which I handled as before). But each sites individual passwords contained therein were randomly generated ascii passwords. They also store TOTP keys to generate 2FA codes as an authenticator app. They also store direct url links so phishing becomes an impossibility; never sign in through any link other than the one you stored in the manager. You can also get creative and have an independent, memorized password (just a character or two) that you can prefix to the password stored in the manager. Ive even encrypted my entire password manager into a veracrypt volume.

  • @jewelflores4105
    @jewelflores4105 3 ปีที่แล้ว +60

    I'll try the multiple email and longer password, thanks Kalle 🙂

    • @Hallden_
      @Hallden_  3 ปีที่แล้ว +12

      Yeah highly recommend it!

    • @jumpergamer1913
      @jumpergamer1913 2 ปีที่แล้ว +13

      @@Hallden_ thanks for the video, now i can commit war crimes

    • @koranhama4837
      @koranhama4837 2 ปีที่แล้ว

      @@jumpergamer1913 go ahead comrade

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว

      he forgot to mention the Tails OS and Prism laptops

  • @joestephani7959
    @joestephani7959 2 ปีที่แล้ว

    I upvoted because you mentioned the final countdown

  • @fridaber6069
    @fridaber6069 2 ปีที่แล้ว +1

    Finally a video that even I, a non-IT-expert, could understand.

  • @DieStockEnte
    @DieStockEnte 3 ปีที่แล้ว +75

    I use hash encrypted passwords. For example I want to use "the final countdown" as password, then I encode it with sha512 or sha256. Then get a long hash and I use it as password. Only I know the "real password", which I am easily able to remember and to encode with sha512/256 to the password I use on web.
    Cool video! 👍🏻

    • @dhay3982
      @dhay3982 2 ปีที่แล้ว +12

      That means that your password is "real password" + "fake password" + your encryption algorithm. Not bad, because some hacker would need to put 3 unrelated info together to break the security.

    • @netautorisationnetautorisa545
      @netautorisationnetautorisa545 2 ปีที่แล้ว

      ​@@dhay3982 *WE DO NOTHING !!! THE PC DO 99% OF "DECHIPER"*
      *EVERY PASSWORD IS A JOKE*
      *EVERY PIN IS A JOKE*
      *THERE IS **#NONE** SAFE THING ON A "COMPUTER" ...OK*
      *THE POINT IS ....*
      *DO NOT WRITE "ANYTHING" ON "COMPUTER*
      *...... WHO CAN GET YOU SELF KILLED .......*
      or
      *...... CAN GET YOU #30 YEARS IN **#JAIL** ....*
      *(NEVER ..OK !!)*
      *THIS IS THE "ONLY" 2 THINGs TO **#REMEMBER** !! FOR LIFE*
      AND I KNOW A "LITTLE" ... ABOUT #IT
      .... oooh WHAT is .....this .!!..
      (clash of clans)
      (club penguin)
      (no end)
      HAVE A GOOD DAY ... YOU

    • @farhanjarif503
      @farhanjarif503 2 ปีที่แล้ว +6

      Extremely complicated passwords need to have more time to decipher, nevertheless the hacking never stops.

    • @pablochocobar074
      @pablochocobar074 2 ปีที่แล้ว +2

      @@netautorisationnetautorisa545 **CAN you EXPLAIN me why you WROTE** it like that? And why did you **put** random names in **THE end**

    • @brazy5006
      @brazy5006 2 ปีที่แล้ว +5

      The better advice would be use strong passwords + MFA, and you're almost impossible to hack if you use your brain a bit.

  • @Chad_Fishy
    @Chad_Fishy 2 ปีที่แล้ว +18

    Let's be real if you clicked this video you need to apply these skills immediately, cuz your getting put on a list after clicking this video

    • @zanetbutane8742
      @zanetbutane8742 2 ปีที่แล้ว +1

      lol its a joke but its also not a joke. I've been coming across so many other serious issues that have that same affect.
      My fault you didn't even say it was a joke - I guess its just the idea that many people will read your comment and assume it is a joke

    • @OneNamelessHero
      @OneNamelessHero ปีที่แล้ว

      Yamete kudasai FBI agent~kun

  • @rodneypate1693
    @rodneypate1693 ปีที่แล้ว

    Great video. I've learned a lot. Thank you

  • @AnonUntraced
    @AnonUntraced ปีที่แล้ว

    Exactly what i needed

  • @MisterL2_yt
    @MisterL2_yt 2 ปีที่แล้ว +3

    2:10 they also track stuff you don't allow them to track explicitly, via their integration and data sales with other companies

  • @sandy7m
    @sandy7m 2 ปีที่แล้ว +11

    Liked the video.
    The password creation system was good.
    I was taught a system many many years ago.
    Name Number symbol(s)
    First step is choose four names. They can be a name of anyone you know preferably, the first names of Grandparents or Aunts or Uncles or long lived pets like cats or dogs.
    The names must be at least 6 character's or longer each
    Look at the four names and notice which letters are common between the four. Each name must have at least one character common to the two we will choose (for example the letter O or E)
    If one of these names does not fulfill this rule then find another name. With all four names you have the first part done.
    Second step - Pick four numbers you can remember They will represent the year and month that someone was born that is in your family network.
    Look at the four numbers and notice which characters are common between the four numbers such that each number has at least one character (for example the number 3 or 2)
    Third step - Choose two special characters. Pick ones that are in the same place with the most common types of keyboard that you will use. In this example we will have ? and > Avoid using things like full stops and commas as they are difficult to see
    Next you need to establish a substituion rule for the characters so you can disguise the passwords.
    For my example I will choose -
    o and 3 and ? will be replaced by **
    e and 2 and > will be replaced by ==
    Always use two or three substitution characters together. Never just the one.
    I now keep a small notepad with the four names and four numbers. But use the disguise substitiutions in those names and numbers when writing them down.
    When a password is created it will always consist of the name first, followed by the number with the special character(s) at the end.
    Now we will say that we have made up a password from my grandad's name and my fathers birthday with the special character ? from my choices
    Fredrick0259?
    On the website I will enter Fredrick0259?
    To keep a record of this I would write
    Fr==drick0==59**
    Now, if anyone comes across Fr==drick0==59** in my house, work (or on my phone) they do not have the actual password.
    You will need to create at least two passwords.
    The first one is for social uses such as email and Facebook. The second one is for cash websites such as paypal or banking.
    Once a year I change out the passwords. Although I have gone longer.
    The names and numbers are writen in a small notepad. I also keep a copy of this in my phone.
    The special characters are kept in my head
    This notepad will also have the old passwords in case I forget to change out a password for a site after not having been their for years.
    To create a new passsowrd I pick another name from the list and a number (they are chose at random). Then choose the special character(s) to end it.
    The final trick with this system is that I can create shorcuts on my PC with the name editied to include the disguised password to act as a hint. The shortcut might be labelled as
    My Gmail - Fr==drick0==59**
    With these shortcuts copied to a memory stick I can have online access at any PC with the passwords easily to hand.
    I have been using this system now for nearly 15 years. The same four names and numbers.
    Once you get used to it there is no need to worry about remembering passwords current or way in the past.
    To show how well this works - Using the example above. What is
    Ge**rge0==64**==
    It is worthwhile noting that this whole system can be reversed and still achieve the required list of passwords and maintain security.
    You would now write the undisguised passwords in your notepad and on your shortcuts. The disguised passwords would now be used at the website.

    • @marilynnelson4718
      @marilynnelson4718 ปีที่แล้ว

      Looks good but Fredrick and George can easily be deciphered . Guessing 1 number easy. Yeah, the question mark - they’re able to run info quickly. I think you were lucky you didn’t get hacked…. Right direction- just need more.

  • @N9TheNoob
    @N9TheNoob ปีที่แล้ว

    this was VERY useful! THANKS

  • @jeromes2909
    @jeromes2909 ปีที่แล้ว

    Fantastic video bro thank you so much 👌👍

  • @BenKenobi123
    @BenKenobi123 4 หลายเดือนก่อน +2

    As you have mentioned the trade-offs of enhancing security at the expense of user experience is what will keep people away from these practices. I find myself in that group of people because I want a good time and I have nothing to hide. Anyways, I do use a password manager (because it’s just easier) and a vpn (to get content from the other side of the world). Thank you for the suggestion about multiple emails I could use it for separation of concerns purposes

  • @HimanshuYadav-nt9zp
    @HimanshuYadav-nt9zp 3 ปีที่แล้ว +35

    Every time I watch your videos, don't know why I feel next video will be music production video😅 such a versatile guy

    • @kallehalldenassistant7578
      @kallehalldenassistant7578 2 ปีที่แล้ว +1

      Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}.......,,,,,,

  • @samsvard
    @samsvard ปีที่แล้ว

    Good video man!

  • @texaseagle9087
    @texaseagle9087 ปีที่แล้ว

    I enjoyed this very much. Thanks!

  • @azamean
    @azamean ปีที่แล้ว +6

    I recommend changing your email occasionally too, it's very easy with outlook/Gmail to add an alias email, make it primary, and delete your old one. So if your email has appeared in any data breaches, it's gone. But you still have access to everything with very little effort

  • @paparazziphotography6712
    @paparazziphotography6712 หลายเดือนก่อน

    I thank U so much for this information & with that I'm pretty much a beginner to the information.but i'm really determined to give it a GO! Thank you for your time & information. Mr. Hop....

  • @dexterflodstrom9975
    @dexterflodstrom9975 ปีที่แล้ว +4

    Great video as always! I'd like to add to the email part in that Simplemail can be used to create email aliases, which essentially allows you to create "new" emails that people can send mail to, but it will get forwarded to your actual email address, thus allowing you to in reality still only manage one email.
    Gmail has this built in as well I believe.

    • @theheinzification
      @theheinzification ปีที่แล้ว

      No, Microsoft (outlook) has.

    • @moltopericoloso
      @moltopericoloso ปีที่แล้ว

      Firefox has Firefox Relay now, user created "burner" email aliases that forward to an actual email address. You can one-time use aliases as and when required or keep some standard ones e.g. one for shopping, one for extortion, two for porn, etc. ;-)

  • @zajlord2930
    @zajlord2930 2 ปีที่แล้ว +44

    i mean the last level could be used against some creeps from like darkweb or someone you made mad. For example if you knife someone in csgo he wont be able to trace your home

  • @gregoryjones4539
    @gregoryjones4539 2 ปีที่แล้ว

    Thanks the knowledge

  • @lethalchaos19
    @lethalchaos19 7 หลายเดือนก่อน

    Thanks for this video

  • @lyfandeth
    @lyfandeth 2 ปีที่แล้ว +7

    Using the plus symbol + for concatenation in email addresses IS actually formally part of the standards, making it easy to create one purpose email addresses. But major ISPs like Goggle will reject these. Goggle also ignores using a period . as a separator despite that also being a required standard.

    • @wojtekpolska1013
      @wojtekpolska1013 2 ปีที่แล้ว +2

      what are you talking about?
      first of all, Google is not and never was an ISP, second, they absolutely do allow you to use the + character in gmail, so idk what are you talking about

    • @mineatomtr
      @mineatomtr ปีที่แล้ว

      @@wojtekpolska1013 he said Goggle not google bruh 🥶💀 when blindness intensifies 💀💀💀💀

  • @SulaimanBotha
    @SulaimanBotha 3 ปีที่แล้ว +34

    I see you're experimenting with longer form content...I'm not complaining though😂

    • @kallehalldenassistant7578
      @kallehalldenassistant7578 2 ปีที่แล้ว

      Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}......

  • @malayariver
    @malayariver ปีที่แล้ว

    Great content, thank you

  • @darylwayne611
    @darylwayne611 ปีที่แล้ว

    Thank you, Very Awesome video!! All the best!

  • @ayva1106
    @ayva1106 2 ปีที่แล้ว +10

    When I make really long random passwords I just memorize the rythm of movement that I make when I'm typing the password out. I don't know half of my actual passwords but I know the hand movements for them :)

    • @LakadMatatag2702
      @LakadMatatag2702 2 ปีที่แล้ว +1

      The problem is if you don't access that site regularly then you can't have muscle memory for that site, so you may forget the password of a site that you haven't accessed for years.

    • @ayva1106
      @ayva1106 2 ปีที่แล้ว +2

      @@LakadMatatag2702you'd be surprised... I've recently logged into an account that I hadn't touched in two years and I typed the password as if I had been doing it every day. Muscle memory lasts a long time 😌

    • @darkenedvision4709
      @darkenedvision4709 ปีที่แล้ว +4

      good for you, not everyone is that kind of mutant. I work construction and go hiking in my free time. I don't have time for all that craziness.

  • @derpo6396
    @derpo6396 2 ปีที่แล้ว +1

    Another way to save your password is saving it inside of an image on another device, this allows you to use a very complex password. While being pretty safe to use.

  • @booyakabambata
    @booyakabambata ปีที่แล้ว

    Dude, THANK YOU. What a great video. This should be mandatory viewing and taught in schools.

    • @beforedrrdpr
      @beforedrrdpr ปีที่แล้ว

      this is not such great of a deal that it needs to be taught in school, but rather 'safety in online' should be

    • @nyudoragon1478
      @nyudoragon1478 9 หลายเดือนก่อน

      ​@@beforedrrdprthen go teach ppl

    • @beforedrrdpr
      @beforedrrdpr 9 หลายเดือนก่อน

      @@nyudoragon1478 i am clearly not expert in that field

  • @EMBEVIDEO
    @EMBEVIDEO 2 ปีที่แล้ว +7

    Anonymity is very hard to reach and you have to avoid most forms of technology. But there are things very powerful that help your real identity to be not that prominent:: Build up a fake identity and spread logical but not real information over the net. Try to make this identity transparent so that it seems to be real. And then use your real personal data only if really necessary. And avoid meta-data. I was working in big data projects and it is scary what you can do with information that seems to be "useless" to the public.

  • @yvsh
    @yvsh 3 ปีที่แล้ว +16

    Snowden: *takes notes

  • @daedaluxs
    @daedaluxs 2 ปีที่แล้ว

    Cool lil thing for emails, you can sign in with all your emails on mobile (up to like 10), and search all inboxes when looking for something.

  • @thesilentgeneration
    @thesilentgeneration ปีที่แล้ว

    For those of us living in certain countries like the Philippines for instance, using Tor trades hard tracking for slow speed. Not all of us have the bandwidth to use Tor without being slowed down to nearly nothing.

  • @SamarthCat
    @SamarthCat 2 ปีที่แล้ว +5

    To create your own proxy you can rent a VPS server somewhere in the cloud and all your internet traffic will appear as if it came from that VPS server.

    • @TsukiNoInu93
      @TsukiNoInu93 2 หลายเดือนก่อน

      yeah, but how will you pay for that? 99% of online banking require passports these days

  • @zelrius8714
    @zelrius8714 2 ปีที่แล้ว +3

    I'm constantly trying to keep myself private bc i've encountered ppl who hacked and it's scary tbh. The good thing is I've done most of these things, and I started doing multiple email thing since last year. However, I do only use one mainly even though I have multiple, so I should really fix that. I really need to try what he said about creating an email for shopping and one for personal so that it's separated, that's smart ngl.

  • @Xizax41325
    @Xizax41325 ปีที่แล้ว

    I do the email one kind of. I have a variety of emails for various things that all forward to my actual email. Not entirely secure since if someone gets into one of the sub emails they'll be able to see where it is forwarding to but it also means that if something gets compromised I can just drop that email, make a new one, and set it back up.
    Its also handy for when they get flooded with spam and stuff from subscriptions/newsletters.

  • @YannMetalhead
    @YannMetalhead ปีที่แล้ว

    Great video!

  • @psychojan1715
    @psychojan1715 3 ปีที่แล้ว +6

    One day i will be an outstanding programmer and i love your videos. A big fan of your videos.😍

    • @Hallden_
      @Hallden_  3 ปีที่แล้ว +2

      Thank you I really appreciate it! And you will for sure

    • @kallehalldenassistant7578
      @kallehalldenassistant7578 2 ปีที่แล้ว

      Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,.....,,,,,

  • @hamfahimkabir
    @hamfahimkabir ปีที่แล้ว +23

    Becoming anonymous is really, really hard. All that things you said works only if you're trying to avoid corporate companies. YES corporate companies. They will have a hard time figuring who you are and making your profile stronger. But government and sometimes other companies will track you down anyways. It might be the way you type or other patterns you follow. And avoiding cameras are also very much impossible. Remember you walk in a certain way. You have favorite coffee or drinks. It's not hard to track you down.

    • @OneBiasedOpinion
      @OneBiasedOpinion ปีที่แล้ว +13

      This was about digital invisibility. Not literal social invisibility. There’s a video on _that_ topic made by a former CIA agent and it showed just how much more difficult it is to absolutely vanish altogether. Most of it had to do with eschewing the digital environment completely, going cash-only, and mostly being a complete loner.

    • @fivr.
      @fivr. ปีที่แล้ว

      nah just buy a whole outfit with cash through people you know, walk with rocks in your shoes into a starbucks with the anonymous clothes + mask and hide the raspberry pi, after that just stay on a VM or RDP with your proxy/vpn (preferrably mullvad vpn) when commiting crimes, and try to stay on TOR as much as possible. also change your cybercrime persona around every year or two and get completely new proxies. if you manage to do this without doing anything dumb like posting pictures anywhere you'd be very near impossible to track through governments. the only way to get you would be through opsec fails or through investigation of where your money comes from, but even if they raid you make sure to have your whole PC encrypted through veracrypt.
      remember all this is a bit overkill if you arent making over 1m/year or more through cybercrime, if your making less then that feds wont really care unless you really make a name for yourself in the time you spend building your personas or if you threaten national security.
      so nah tracking you down through the internet would be pretty hard for the government if you try hard enough

    • @Mr_Anubis
      @Mr_Anubis 7 หลายเดือนก่อน

      ​@@OneBiasedOpinionsend link to me

  • @juancarlosvaleron4850
    @juancarlosvaleron4850 ปีที่แล้ว +2

    It's so funny. Digital is now so cumbersome I need to go back to my paper notebook to store all my data. Thank you digital revolution!

  • @DrHyPer
    @DrHyPer 8 หลายเดือนก่อน +1

    Legendary Video 👏

  • @swapnilgarg2829
    @swapnilgarg2829 2 ปีที่แล้ว +12

    Strong password is like sheldon creating long password for pennny. 😂

  • @vlgado3895
    @vlgado3895 ปีที่แล้ว +4

    At point 17.01 you missed a golden opportunity for all the Tolkien fans. I was SO sure a few times you will say it: "but to disappear entirely, that is a rare gift".
    Very instructive video by the way. I especially liked the part about replacing a letter with a group of special characters. Very simple and useful.

  • @ruizongge3432
    @ruizongge3432 ปีที่แล้ว

    man, doing a research for my comic. now my brain is burning from all of that information.

  • @LiborTinka
    @LiborTinka 2 ปีที่แล้ว

    I used KeePass for a long time, then Dashlane and then I finally migrated to Linux, made an RSA key pair and stored all passwords with GnuPG. There is a useful "pass" script working on top of GPG. The passwords are simple binary files (encrypted) and can be easily transfered between machines or synced with Git. Of course, it's better not to show your files - then a LUKS-encrypted file system on your OS drive and thumb drives comes in handy. There is also a great password generator utilities like "apg" and "xkcdpass" that can make rememberable passwords for you that are strong against dictionary attacks.
    If you are really paranoid, there are privacy-oriented distributions like Tails.

  • @samarmohan9891
    @samarmohan9891 3 ปีที่แล้ว +74

    The 9 people who disliked are the hackers who want to see everything you do on the internet.

    • @JohnSmith-gd2ws
      @JohnSmith-gd2ws 2 ปีที่แล้ว +3

      No those are the people who are pulling their hair out from him recommending paid cloud based closed source password managers after he scared people with the idea of remembering hard passwords instead of jumping to the subject of self hosted or offline open source pass managers such as bitwarden or keepass.
      Or him telling that the exit node on tor can see you and you need a proxy. No they can't that's the reason why you are routed thru 3 random computers ran by ordonery people from home. Those are also proxies and they are not hiden in a random starbucks (What TF) Trafic is deencrypted and reencrypted on each node. Nodes owned by the same person are not allowed to connect to each other and get black listed if they do. Also evil exit nodes are non existent and even if they dont get insta banned before verified they wont be able to do anything anyways
      But that no concern anymore seeing dislikes since youtube is a crybaby over rewind and hated goverments and companies are also angry over seeing crap ton of dislikes

    • @satoshinakamoto7253
      @satoshinakamoto7253 2 ปีที่แล้ว

      he forgot to mention the Tails OS and Prism laptops

    • @bringbackdislikes3195
      @bringbackdislikes3195 2 ปีที่แล้ว

      @@satoshinakamoto7253 You forgot to shut up and stop copy pasting the same comment everywhere.

  • @Jxhsxn
    @Jxhsxn 10 หลายเดือนก่อน +4

    What we see: How to become invisible online
    What hackers see: How to track invisible people online

  • @ravenjoker254
    @ravenjoker254 ปีที่แล้ว

    I'm glad to see I already do most of the Tier 1 security! the emails weren't even for security, it really really helps keeping a clean inbox to have separate emails for separate thinga. never again will this personal email get buried under shipping notifications!

  • @blusun.
    @blusun. ปีที่แล้ว

    as a writer, i thank you for your work.