5:54 how to use Tor 7:34 Tor Browsing vs Tor Routing 9:21 The alternative to Tor: Lokinet 13:13 Oxen Nodes 14:00 Darknet vs Darkweb 15:37 Vpn when you download Tor! 16:22 Tor Browser does not offers sufficient protection 18:45 Other Darknet solutions
Bravo ROB. one of your complete & comprehensive coverages in Top privacy and security platforms. Your ability to clarify and simplify concepts into pro active uses are spot on. You continue to include an educational theme to your presentations, My observations come from a tool belt of multi 3 letter influences.. kudos & bravo. continued success. Achilles.
Rob. Shortly, we (in the UK and the rest of the world) will be forced to have a "digital ID" to access the internet, presumably enforced at the IP level, thereby not even being able to log on to a VPN ..... Any ideas on how to circumnavigate this to access the internet?
Yep the UK psychopath government have been pushing to do this for years since David pigfkker Cameron got up on stage at the UN and said we will not tolerate these conspiracies about 911 and 77 hahaha they were so annoyed that everyone was calling out their contrived events and exposing them left right and centre they had to memory hole thousands of videos and wipe out so many legit commentators on this platform . Unreal.
Build your own browser that removes that part of the PDU, and it's checksum flag? Just spitballing an idea. Malform the packet or attack the fuzz surface vector?
First of all Rob, Thanks a lot for the awesome content you provide. Have you also covered messengers like Matrix (element) and Briar? What are your thoughts on them regarding privacy and anonymity?
I have a different idea. Internet was very entertaining in the year 2000, but since then it became boring. So you will not see me wasting as much time as I used to online. I went for tabletop for entertainment and it is absolutely a blast. I prefer to talk to people face to face instead of using social media.
Exactly...the net was good but now is populated by "social media" types...a big difference from the early days where you needed to type commands to to even log on.those days were much better,the only downside was the sloooow speeds. Once the general population got the internet it was always going to become crap...my first account was in 1994 and much prefer that to what we have now and am slowly decoupling myself from the net.
A computer security acquaintance told me to stay clear of the dark web. I can say one thing positive about that. People on the dark web showed me how to write code to protect my software, then someone made it illegal to use. All it did was protect the code layer from view or copying. When you remove my disc, normal operation of the computer is returned. I don't use it anymore. To whoever it was that helped me, thank you. I don't know your real name (I wouldn't say it anyway).
the dark web free uncensored and nothing is out of bounds, it supposedly has illegal stuff, but what walk of life can not turn into something illegal, with a bit of effete it what you use it for, not what it is, that matters, when out cries, to ban it, happen, that being up some thing, drugs gun or something like that, but there not exclusive to the dark web, they where happen long before the dark web, and the word "dark web" put around, but what is the dark web, it the bits of the internet that are not catalogued by big search engines, your own home internet could be described as part of the dark web, now have a new look at banning the dark web, are happy to have your home internet fully searched and indexed, that every thing that has storage, and is on your home network at some point just take one stage on, and have all your round the home web cam, security cameras and microphones to, all being search and caterloged 24/7 every day for who no's what use?
"In the marvel comics" They are both (Thor and Loki) central characters of norse mythology. It's like saying "Amaterasu from the Naruto Manga". No hard feelings, I don't "demand" you knowing about some obscure stuff like that, just for future reference. Loki's specialty being his "silver tongue" it seems quite an apt name for an encrypted protocol. He's a bit of an ambivalent character, using his lies and half truths to the benefit of "the good" many times, but also for "evil" purposes. Which is probably why they chose him as a villain in the Marvel comics. In the end he ends up being tortured for eternity, since he bangs all the other gods wifes, which he got into bed with his trickery - and then brags about it, which is his undoing... At least according to some stories, norse mythology having some basis in oral tradition does not have a 100% clear canon.
I thought the same. But you can't expect from non-europeans to know norse or germanic mythology. I know nothing about african or southamerican Mythology.
All I want to know right now, this very hour, is how to get rid of the VPN and security I've now paid for (it automatically renews which I don't seem to be able to stop) and get what you offer or recommend. I don't believe there's any way for the USA to continue as is for 24 more months.
@Rob Braxman . Hi. Please Answer these. 1. If you have vpn on, will using regular email show your IP address on the header? I’ve never noticed an IP address on emails. 2. since BytzVPN uses Tor with Brax Router, how much does this slow down your internet service? 3. Since sessions messaging uses lokinet is it a secure messaging app? 4. messaging is only secure e-to e via linux to linux or OS to OS. So what do you suggest with either linux or degoogled android for secure messaging? Is this the same scenerio for voice calls? Can you have a non recorded phone call with degoogled android or linux?
Hello, I've enjoyed learning some of your knowledge but my phone is continuing to be targeted with the inability to share vital information. So I'm considering your brax phone, the best performing for the US. Paper information to operate it, as well as anywhere I can go to learn far more in this direction. We need to be prepared for an information war like we've never imagined before. So where do I get your phone, ( untraceable, black ops version and a price) thank you for your tireless work
Rob. Is there a reasonable option to the internet ? Here in Canada, the government has given its self the right to censor and control what can be put up online as well as what can be obtained on line. Is there other systems in the world not public yet ? Help. Thanks
Another nice video. What is your input on IPFS, the Mega network for file sharing, torrenting, and blockchain based social media like Bastyon. I do wish you got into more specific (technical) details on these other darknet serviecs that are less known: I2P, freenet, etc. Tor is much more commonly known already... many videos online about it... it doesnt really need another. Its these other ones that are hard to find any information on. As for lokinet, I heard about them a couple years ago but when I looked them up their sites and services were down... for a long time. I thought they were taken out by gov, or werent self-sustainable. But... Im surprised to hear you taking about them now in 2023. I guess they're still a thing.
Can I learn to be content running TOR in Tails as my default browser? Seen the video twice now. Seems helpful to me, needing to wake up to so much. It's like I've been asleep.
Rob please can you suggest some books to study all these topics about privacy? I watch all your videos but I feel like my memory doesn’t keep informations learned by videos, I need book of paper. Please write a book🙏🏻🙏🏻🙏🏻🙏🏻
The Privacy, security and OSint shows host has a comprehensive book called extreme privacy. The podcast is linked to the Darknet diaries series. Both excellent series. Rob should definately write a book if he has the time.
One hint for increased understanding is to turn on the closed captioning. This way if you see a word you don't understand you can look it up. I stop the video and look up words I don't understand. Going past words you don't understand can put a "blank" in your mind. I'd love to get Rob's recommendation on a computer dictionary.
@@michaela2098 The best book is the careful notes you take while watching his video. Don't understand a concept or term, pause the video and look it up.
I am not a hacker of sorts or any kind of suspicious person, but I like to be private in the open web world so I use Tor from inside Brave. It fair to assume that I am left private or is someone able to see me?
It will require a lot of dedication to see track your TCP data, but your UDP data is not sent over Tor. It's something to be aware of, although the Tor Browser keeps track of that, of course.
Hi Rob. This is not related to the above video, but I noticed something concerning after acquiring a used phone to install LineageOS on. Basically, without inserting a SIM card, I was trying to use my phone's built in GPS to ping my location on OsManD, but no matter how many times I tried it was not able to get my location. However, after popping in a SIM card... you guessed it. It finally started receiving my location only after inserting the SIM. My question is: shouldn't my phone's built in GPS be enough to get my location? Why does the SIM card have to be involved at all? And is this a cause for concern in terms of privacy and surveillance by my phone plans service provider? Thanks.
estimated guess: usually, the gps module and the mobile networking chips reside on a single "node" (e.g. PCIe card), and it might be the case that your model or firmware doesn't support turning off just a part of it or initializing a partially. or alternatively, it is turned off in hardware by disconnecting the node if no SIM card is inserted.
Rob - as a community watch target, is there a way to fight this? Should I even bother? I inherited this from my dad's side of the family. Problem is, I live with others who have no interest in keeping our internet safe. So should I even bother? Once a target, I'm assuming it's impossible to escape these police agencies. They are ruthless.
Rob, is there a way to delete all of my text messages, in Google messenger, at once? I have a moto e 5 Android. Are those messages taking up space on my phone?
The point is that deleting data from your filesystem never deletes data from your storage device. It will eventually be overwritten when something needs to do so, but that could take decades if you have a large storage device. A filesystem is just a map; if you delete a cabin from a map, it does not mean the cabin no longer exists in the landscape. Deleting files is the same. Once data is deleted, it does not "take up space", because it can be overwritten at any time. But just because it _can_ be overwritten, does not mean that it will be.
What servers do u use for your VPN?? Like is it decentralized? Or u run your own servers?, Thanks for your time , definitely thing about getting your VPN! Plz help
16:48 _"Tails and Whonix"_ How about _Parrot OS?_ Not that complicated like Whonix, but made for installation. It comes with *_Anon Surf_* to torify all the traffic. What do you think about? Or do you even have checked it out?
I only use Tails and Whonix as examples. You can load TOR on any Linux distro if you know how. You can also load Lokinet instead which is what I use on my own Linux computer
@@robbraxmantech How to load _"Anonsurf"_ to my linux mint I don't know. That's why I think about using Parrot, because it's coming by default with _"Anonsurf"._ And I am interested to know, how do you think about the tiny _"Anonsurf"_ in comparison to Whonix regarding practicability, RAM-consumption etc.?
@Rob: From lokinetorg I downloaded, then installed it on windows with VPN. It seems interesting. But a red ring surrounds the on/off-button and traffic still doesn't count. It doesn't show anything right of "Uptime:", "Version:" and "Lokinet-address.". How to get it online? Can you explain it to me, please?
@@onemoremisfit you should learn about something before trying to teach others. he was not caught because of vulnerabilities in Tor. he was caught because he did not use proper operational security. in other words, he slipped up and leaked information. Tor did not leak it.
@@quickmythril2398 I did not say anything about Tor specifically and spare me the pious admonitions, because I'm not trying to teach anybody. I expressed my personal doubt about the idea of absolutely secure anonymity, and all I know is what I said: the silk road guy got busted.
@@onemoremisfit if you are talking about silk road, you are talking about tor. but clearly you are showing you have no idea what you are talking about at all. not sure why anyone would seek or value your opinion on anonymity in that case.
Our govt is trying to pass a bill outlawing encryption for the people! I, like many have been told....the down side to the TOR concept is that, should your system be seized, you are liable for the content of all msg passing through (i.e the content of that data)??
@@JJFX- This is another way of taking away privacy of individuals. A dossier has been flagged for everyone. This is called 'tracking' and is dangerous and deadly.
@@manonfire3642 TH-cam already tracked every thing you do on the platform. This is just another vague attempt to help people identify all the bots they still aren't going to ban.
Hi, do you think would be possible to have a main os linux and a "router" wth tor&vpn in vm with openwrt or whonix? Meaning tht the main has internet onlyvthrough vm virtual router?
I can only wish I had the knowledge and experience you have. Then I would feel safe and unchained. I can't even recover an important video someone downloaded on TH-cam that was saved to my watchlist for future reference. I had five videos, politically contented, that was deleted by TH-cam.
@Jo-Erlend Schinstad Thanks for the advice. My learning has been with research and reference. When one has to weed through the bs and what's accurate, it's like a lost cause. Hindsight, I should have enrolled in computer programming. I was too gullible to see what we would face today. Feels like my last hope is to bug out and go off grid completely. Being self-sufficient in what God provided was the survival of my elders. Unfortunately, that big eye in the sky through technology advancements would probably find me laid to rest, clutching my firearm.
@@sambraswell8388: There are very good technical communities where people care deeply about facts. If you want to learn, it's not that difficult. But general social media, where everyone has an incentive to pretend to be experts, is a bad place to learn. But just some basics will get you a very long way.
@@jeschinstad I suspect a lot of ppl watch these types of vids for exactly that reason. The problem is unless one has some baseline then how are ppl to know what's true & what's false.
anlattıklarınızın ne olduğunuda anlamadık hala tor,p2p,hyphanet nedir ne işe yarar anlamadım.hyphanet kurdum açtım bir yazı ve frefoxumu gizli aramaya aldı fakat bi özellik getirmedi kaldırdım.
videolarda dil yazı sorunu.cansız videolarda chromede kısmi ücretsiz olarak altyazı ve sesli okuma çözüm bulsakda oda berbat canlı yayınlarda çözüm bulamıyoruz.otomatik altyazı çeviri bile kapatılıyor.altyazılar çok hızlı takip edemiyoruz.dil ilk önce kelime kelime öğrenmeli sonra cümle ve dilbilgisi.malesef bizim dilde rakam ve harflerde benzerlik var.0,0,9,g,ğ,h vb ayrıca p,b,t,d gbi ayrımı bitişikmi yazılır çözemedik.ayrıca bel altı da çoğunlukda.örnek seksen,amca,sigorta eksik gibi.argo da var.q ve w da yok. dilimiz güzelde berbat ettiler yabancı kelimelerde doldu..
Works great for normal privacy, but any government or APT will own you pretty quickly unless you use human shields. But if you're a Pablo Escobar or something, you can definitely do it, for instance live migrating LXD servers running Wireguard.
@@jeschinstad I'm not superbly tech-head or know the ins and out of computer networking, coding, or hardware. But have you heard of Deeper Network devices? *edit: just curious about your opinion on the company's tech.
@@couchpotatter: No, I hadn't heard about that, but on their website, they make this claim: «Comes fully loaded with the world’s first and only decentralized VPN»
Now if you were able to impplement something that would allow me to access my local machines over the internet safely, now that is something i would be willing to pay for.
You can use Wireguard for that. Unlike Tor, it works with all traffic and is quite simple to use. Unlike these VPN services you buy, it's just software that you install on your PC and acts like an extra network card, with its own sets of IPs.
@@fokyewtoob8835: Yes. These days, I'd rather recommend Wireguard for that type of use and instead use SSH on top. The benefit of Wireguard is that it doesn't depend on static addresses; as long as one of the nodes are reachable over its previous IP, peers will automatically learn how to connect.
It's pretty clear why. You are probably best off just using the fort VeraCrypt these days. They did a security audit and fixed bugs that were present in the last version of TrueCrypt
@@linsqopiring6816: The issue is latency, not bandwidth. At some point, while you _can_ stream over header-stripping overlay networks, you will prefer to just download in advance. And there's no value of adds on these networks, since your identity cannot be proven, so nobody will pay for it. Non-streaming codecs are far more efficient, making it far more appealing.
@@jeschinstad Latency is a non issue for streaming videos since video players already buffer a certain amount. The video player IS actually downloading in it advance. "And there's no value of adds on these networks, since your identity cannot be proven, so nobody will pay for it." Can you rephrase that ?
@@linsqopiring6816: Buffering is a smaller issue for shorter videos because the buffering takes place before the video. For longer videos, you get lots of breaks when you run out of buffer, which you invariably will because latency quickly adds up, as Grace Hopper so eloquently illustrated. For ads, if you pay for visitors on my site, you need to know that those visitors are actually unique, because otherwise, I could just inflate my numbers to make you pay more or just invent visitors. With Tor, you can't prove unique visitors, hence advertisements are useless.
The ONLY solution is being in a network where webpages are downloaded to you randomly throughout your day. We must become willing participants in random downloads on our computers as a condition of participation. Each request we make must be just that, a request we may or may not be served. Each request must be delayed to be accompanied by random requests NOT explicitly made.
I'm fairly sure I got on someone's list for doing that! It was a Firefox add-on that 'clicked' on *every single link* on the page you were reading. In the background it would download the document at the URL and discarded it, but it would stop early if you clicked on a new link. It was used to mess up advert tracking more than visiting dodgy sites. Unfortunately I think it might have swept up a few Al Quaida (or however it's spelt) links. 🙂 I'm not a baddie! I'm really very boring! Google web analytics told me my website (for my son's kindergarten in Australia) was being read by the folks at Fort Meade. 🙄
Bit Caesars senate though.. Or nuclear epstein... Everyone sharing in guilt just means open season autogenda magic Martial law another more surgical way That's when it matters that as a surveyor George Washington kept his eye on a plot he saw and wanted then eventually obtained by multi tasking the area into the territory they came to need to occupy and secure strategically.
WHAT WE DO WHIT ANTIVIRUS APP . OR HOW I NAME IT I DONT KNOW THEY ARE REALY BOURING THEY COME TO MY COPPUTER WHIT OUT I ASK FOR THEM WHAT WE CAN DO TO STOP THIS ANTI VIRUS PROGRAMS** i realy dont know nothing about this ? is this programs good or not . i dont have nothing to hide , but if its posibile to somebody block my PC if i dont have this programs ??
Stuff Marvel comics. Loki and Thor are older than Christianity by a long way! It's a bit like saying you can only find the real Jesus in the Freak brothers comics
There's only two. Pinephone and Librem. Most phones have their radio permanently switched on and can easily be owned remotely. With new phones, the radio is in the SoC, making it theoretically impossible to make them safe.
I research nuclear studies and all sorts of illegal chemical manufacturing in the open with 0 care. Anarchist cookbook jolly Rodgers cookbook full recipes and such
Don't believe computers are private. In order for privacy. You have to put the hardware in a Faraday cage and hope it is sealed.If it is not sealed a near by computer will act as a bridge. There is a peer to peer that is unknown. I observed it talking on 462 mhz .I observed it advertising it's self every so often in the Faraday cage.before I put it in the Faraday it would not stop talking on 462 mhz. I setup a laptop near the computer in the Faraday cage because i need it.long after I put it in the Faraday cage. The next time the computer advertised it's self they both started screaming on 462 mhz. The only reason i know this is because I had a scanner on . Every time I turned on my the mobo I bought for my gpu to run llm's on. It made alot of noise on 462 mhz. So i put in a Faraday cage because I didn't want to lose my hardware to the FCC. I found out all this.
@@robbraxmantech: This distinction does not exist. Tor Browser is simply a browser that uses Tor for its traffic, along with some other things like tracking leaks.
5:54 how to use Tor
7:34 Tor Browsing vs Tor Routing
9:21 The alternative to Tor: Lokinet
13:13 Oxen Nodes
14:00 Darknet vs Darkweb
15:37 Vpn when you download Tor!
16:22 Tor Browser does not offers
sufficient protection
18:45 Other Darknet solutions
@Nancy Baloney 😂🙏🏻
Not all heroes wear capes
Tnx for this. He should know better.
But he doesn’t say the correct way to use Tor.. he jumped to other topics after saying “the typical user etc…”
I can’t stop watching Rob Braxman lessons.
You loves us: all informations you give to us is some kind of love and we love you back Rob❤
Rob, you are providing an invaluable public service, please keep it up. I have learned so much about internet privacy from your talks. Thanks!!
Bravo ROB. one of your complete & comprehensive coverages in Top privacy and security platforms. Your ability to
clarify and simplify concepts into pro active uses are spot on. You continue to include an educational theme to your presentations, My observations come from a tool belt of multi 3 letter influences.. kudos & bravo. continued success. Achilles.
5:44
This is the first time I have seen such a honest advertisement from a VPN provider
Rob. Shortly, we (in the UK and the rest of the world) will be forced to have a "digital ID" to access the internet, presumably enforced at the IP level, thereby not even being able to log on to a VPN ..... Any ideas on how to circumnavigate this to access the internet?
Yep the UK psychopath government have been pushing to do this for years since David pigfkker Cameron got up on stage at the UN and said we will not tolerate these conspiracies about 911 and 77 hahaha they were so annoyed that everyone was calling out their contrived events and exposing them left right and centre they had to memory hole thousands of videos and wipe out so many legit commentators on this platform . Unreal.
It says there is an answer but I can’t find it /read it, I’m curious what the answer is.
Build your own browser that removes that part of the PDU, and it's checksum flag? Just spitballing an idea. Malform the packet or attack the fuzz surface vector?
Chris , the British parliament stopped the id bill yesterday 👍
@@w.ijlstra1057 There are a lot of things we can do. Pay cash is one.
Nice to see Lokinet get some exposure. Good video!
It's just a shame that he kept it so high level...
I tell everyone I talk to that it would be positive to watch your TH-cam site !
Your closing remarks answered most of what I wanted to know but not all
First of all Rob, Thanks a lot for the awesome content you provide.
Have you also covered messengers like Matrix (element) and Briar?
What are your thoughts on them regarding privacy and anonymity?
Just watching this video might put one “on the list!” 😊
Here in Brazil, every internet provider you hire is obliged to register your document number with the IP and period of use of the IP
Would be interesting to see you doing a Demo of the Tools you mentioned.
I have a different idea. Internet was very entertaining in the year 2000, but since then it became boring. So you will not see me wasting as much time as I used to online. I went for tabletop for entertainment and it is absolutely a blast. I prefer to talk to people face to face instead of using social media.
Exactly...the net was good but now is populated by "social media" types...a big difference from the early days where you needed to type commands to to even log on.those days were much better,the only downside was the sloooow speeds. Once the general population got the internet it was always going to become crap...my first account was in 1994 and much prefer that to what we have now and am slowly decoupling myself from the net.
And if you use masks and costumes - you can have anonymity.
A computer security acquaintance told me to stay clear of the dark web. I can say one thing positive about that. People on the dark web showed me how to write code to protect my software, then someone made it illegal to use. All it did was protect the code layer from view or copying. When you remove my disc, normal operation of the computer is returned.
I don't use it anymore.
To whoever it was that helped me, thank you. I don't know your real name (I wouldn't say it anyway).
the dark web free uncensored and nothing is out of bounds, it supposedly has illegal stuff, but what walk of life can not turn into something illegal, with a bit of effete it what you use it for, not what it is, that matters, when out cries, to ban it, happen, that being up some thing, drugs gun or something like that, but there not exclusive to the dark web, they where happen long before the dark web,
and the word "dark web" put around, but what is the dark web, it the bits of the internet that are not catalogued by big search engines, your own home internet could be described as part of the dark web,
now have a new look at banning the dark web, are happy to have your home internet fully searched and indexed, that every thing that has storage, and is on your home network at some point just take one stage on, and have all your round the home web cam, security cameras and microphones to, all being search and caterloged 24/7 every day for who no's what use?
The best tactic against this surveillance bug would be when millions of people visit the illegal sites on the dark web every day.
Nope
"In the marvel comics"
They are both (Thor and Loki) central characters of norse mythology. It's like saying "Amaterasu from the Naruto Manga". No hard feelings, I don't "demand" you knowing about some obscure stuff like that, just for future reference.
Loki's specialty being his "silver tongue" it seems quite an apt name for an encrypted protocol. He's a bit of an ambivalent character, using his lies and half truths to the benefit of "the good" many times, but also for "evil" purposes. Which is probably why they chose him as a villain in the Marvel comics. In the end he ends up being tortured for eternity, since he bangs all the other gods wifes, which he got into bed with his trickery - and then brags about it, which is his undoing... At least according to some stories, norse mythology having some basis in oral tradition does not have a 100% clear canon.
I thought the same. But you can't expect from non-europeans to know norse or germanic mythology. I know nothing about african or southamerican Mythology.
at least you're honest about what you represent
HOW TO DECIPHER KEY IDENTIFICATION WITH SOFTWARE
Thanks!
Thanks Rob. Excellent information.
All I want to know right now, this very hour, is how to get rid of the VPN and security I've now paid for (it automatically renews which I don't seem to be able to stop) and get what you offer or recommend. I don't believe there's any way for the USA to continue as is for 24 more months.
Have you contacted your bank?
I had IP vanish on auto pay and they cut me off without a warning and now its still active on my t.v.
@Rob Braxman . Hi. Please Answer these. 1. If you have vpn on, will using regular email show your IP address on the header? I’ve never noticed an IP address on emails. 2. since BytzVPN uses Tor with Brax Router, how much does this slow down your internet service? 3. Since sessions messaging uses lokinet is it a secure messaging app? 4. messaging is only secure e-to e via linux to linux or OS to OS. So what do you suggest with either linux or degoogled android for secure messaging? Is this the same scenerio for voice calls? Can you have a non recorded phone call with degoogled android or linux?
Hello, I've enjoyed learning some of your knowledge but my phone is continuing to be targeted with the inability to share vital information. So I'm considering your brax phone, the best performing for the US. Paper information to operate it, as well as anywhere I can go to learn far more in this direction. We need to be prepared for an information war like we've never imagined before. So where do I get your phone, ( untraceable, black ops version and a price) thank you for your tireless work
Rob. Is there a reasonable option to the internet ? Here in Canada, the government has given its self the right to censor and control what can be put up online as well as what can be obtained on line. Is there other systems in the world not public yet ? Help.
Thanks
Another nice video. What is your input on IPFS, the Mega network for file sharing, torrenting, and blockchain based social media like Bastyon.
I do wish you got into more specific (technical) details on these other darknet serviecs that are less known: I2P, freenet, etc. Tor is much more commonly known already... many videos online about it... it doesnt really need another. Its these other ones that are hard to find any information on.
As for lokinet, I heard about them a couple years ago but when I looked them up their sites and services were down... for a long time. I thought they were taken out by gov, or werent self-sustainable. But... Im surprised to hear you taking about them now in 2023. I guess they're still a thing.
Lokinet is the future
Can I learn to be content running TOR in Tails as my default browser? Seen the video twice now. Seems helpful to me, needing to wake up to so much. It's like I've been asleep.
Orbot is now on iPhone via the Onion Browser
Brax ... what about replacing the Cable Modem?
Hello Brax How's this new senate bill 686 "Restrict Act" gonna affect using these networks?
What about using tor through Linux tails... Is there any other special thing needed to be done or is that right out of the box...
out of the box, as discussed in the video
Legend 👍 good source of information
Rob thank you. your knowledge is masterclass
Rob please can you suggest some books to study all these topics about privacy?
I watch all your videos but I feel like my memory doesn’t keep informations learned by videos, I need book of paper.
Please write a book🙏🏻🙏🏻🙏🏻🙏🏻
The Privacy, security and OSint shows host has a comprehensive book called extreme privacy. The podcast is linked to the Darknet diaries series. Both excellent series. Rob should definately write a book if he has the time.
One hint for increased understanding is to turn on the closed captioning. This way if you see a word you don't understand you can look it up. I stop the video and look up words I don't understand. Going past words you don't understand can put a "blank" in your mind. I'd love to get Rob's recommendation on a computer dictionary.
@@michaela2098 the book is “Extreme Privacy”? Thanks 🙏🏻
@@kathym6603 thanks Kathy❤️
@@michaela2098 The best book is the careful notes you take while watching his video. Don't understand a concept or term, pause the video and look it up.
Unrelated, but whats your opinion on the Nostr protocol?
I am not a hacker of sorts or any kind of suspicious person, but I like to be private in the open web world so I use Tor from inside Brave. It fair to assume that I am left private or is someone able to see me?
They will know you're using tor but not necessarily what for.
@@linsqopiring6816 oh, got it.
It will require a lot of dedication to see track your TCP data, but your UDP data is not sent over Tor. It's something to be aware of, although the Tor Browser keeps track of that, of course.
Made me think about Ross Ulbricht :)
Thank you for your thoughtful and intelligent and purposeful work. You teach well.
youtubede konuşma altyazı sesli sessiz çeviri ayrıdır konuşmasız ekrandaki yazıları çeviri ayrıdır genelde ocr eklentileridir.
Hi Rob. This is not related to the above video, but I noticed something concerning after acquiring a used phone to install LineageOS on. Basically, without inserting a SIM card, I was trying to use my phone's built in GPS to ping my location on OsManD, but no matter how many times I tried it was not able to get my location. However, after popping in a SIM card... you guessed it. It finally started receiving my location only after inserting the SIM. My question is: shouldn't my phone's built in GPS be enough to get my location? Why does the SIM card have to be involved at all? And is this a cause for concern in terms of privacy and surveillance by my phone plans service provider?
Thanks.
estimated guess: usually, the gps module and the mobile networking chips reside on a single "node" (e.g. PCIe card), and it might be the case that your model or firmware doesn't support turning off just a part of it or initializing a partially. or alternatively, it is turned off in hardware by disconnecting the node if no SIM card is inserted.
Carrier lock
"people in oppressed places" - like the Collective West
What about AnonSurf, that is built into Parrot Linux? Isn't that an onion routing system?
Great summary!
Is my trucrypt encrypted data still secure since they were quietly disappeared a decade ago?
Just make sure you can still decrypt it!
Rob - as a community watch target, is there a way to fight this? Should I even bother? I inherited this from my dad's side of the family. Problem is, I live with others who have no interest in keeping our internet safe. So should I even bother? Once a target, I'm assuming it's impossible to escape these police agencies. They are ruthless.
Do you not have a deGoogled phone? Start with that
Rob, is there a way to delete all of my text messages, in Google messenger, at once? I have a moto e 5 Android. Are those messages taking up space on my phone?
The point is that deleting data from your filesystem never deletes data from your storage device. It will eventually be overwritten when something needs to do so, but that could take decades if you have a large storage device. A filesystem is just a map; if you delete a cabin from a map, it does not mean the cabin no longer exists in the landscape. Deleting files is the same. Once data is deleted, it does not "take up space", because it can be overwritten at any time. But just because it _can_ be overwritten, does not mean that it will be.
So how do I get the Tor browser without being put on a surveillance list?
vpn
or an internet cafe or library
Mr.brax, Thor and Loki are from Nordic mythology not comic books.
Do you know about the Yggdrasil network?
Yes. that has some possible uses too though it is not onion routed and uses iPV6.
Qortal is another lesser known one.
What servers do u use for your VPN?? Like is it decentralized? Or u run your own servers?, Thanks for your time , definitely thing about getting your VPN! Plz help
We run our own Linux servers
16:48 _"Tails and Whonix"_
How about _Parrot OS?_ Not that complicated like Whonix, but made for installation. It comes with *_Anon Surf_* to torify all the traffic.
What do you think about? Or do you even have checked it out?
I only use Tails and Whonix as examples. You can load TOR on any Linux distro if you know how. You can also load Lokinet instead which is what I use on my own Linux computer
@@robbraxmantech How to load _"Anonsurf"_ to my linux mint I don't know. That's why I think about using Parrot, because it's coming by default with _"Anonsurf"._ And I am interested to know, how do you think about the tiny _"Anonsurf"_ in comparison to Whonix regarding practicability, RAM-consumption etc.?
@Rob: From lokinetorg I downloaded, then installed it on windows with VPN. It seems interesting. But a red ring surrounds the on/off-button and traffic still doesn't count. It doesn't show anything right of "Uptime:", "Version:" and "Lokinet-address.". How to get it online? Can you explain it to me, please?
Excited to see, who is behind of all this anonymity stuff. Trustworthy or not?
The feds busted the guy who was running silk road, if that's an indication of any anonymity.
@@onemoremisfit you should learn about something before trying to teach others. he was not caught because of vulnerabilities in Tor. he was caught because he did not use proper operational security. in other words, he slipped up and leaked information. Tor did not leak it.
@@quickmythril2398 I did not say anything about Tor specifically and spare me the pious admonitions, because I'm not trying to teach anybody. I expressed my personal doubt about the idea of absolutely secure anonymity, and all I know is what I said: the silk road guy got busted.
@@onemoremisfit if you are talking about silk road, you are talking about tor. but clearly you are showing you have no idea what you are talking about at all. not sure why anyone would seek or value your opinion on anonymity in that case.
I2P actually has no fewer than 3 exit nodes, one of which is a Tor exit.
Our govt is trying to pass a bill outlawing encryption for the people! I, like many have been told....the down side to the TOR concept is that, should your system be seized, you are liable for the content of all msg passing through (i.e the content of that data)??
You should pay real attention to legal consequences before running a Tor exit node, that's for sure.
Also, what are the 4 numbers tacked on to my comment name?
I've wondered that a as well
For real. What the heck is it as i never added it nor do i have a twitter acc.
TH-cam added these for everyone. You can change it to whatever you want though, just look up Yotube handles.
@@JJFX- This is another way of taking away privacy of individuals. A dossier has been flagged for everyone. This is called 'tracking' and is dangerous and deadly.
@@manonfire3642 TH-cam already tracked every thing you do on the platform. This is just another vague attempt to help people identify all the bots they still aren't going to ban.
I had IP vanish for a year or so and I asked my internet guy to use IP vanish on my router
Thank-you Mr.Braxman
Hi, do you think would be possible to have a main os linux and a "router" wth tor&vpn in vm with openwrt or whonix? Meaning tht the main has internet onlyvthrough vm virtual router?
That's our Braxrouter product
@@robbraxmantech Guess not what I ment: braxrouter is a physical one, I asked about virtual router
Talk about Zeronet over TOR
I can only wish I had the knowledge and experience you have. Then I would feel safe and unchained. I can't even recover an important video someone downloaded on TH-cam that was saved to my watchlist for future reference. I had five videos, politically contented, that was deleted by TH-cam.
There is a lot of dangerous half-truths in this video and you would be better served to learn the basics yourself. It's not difficult.
@Jo-Erlend Schinstad Thanks for the advice. My learning has been with research and reference. When one has to weed through the bs and what's accurate, it's like a lost cause. Hindsight, I should have enrolled in computer programming. I was too gullible to see what we would face today. Feels like my last hope is to bug out and go off grid completely. Being self-sufficient in what God provided was the survival of my elders. Unfortunately, that big eye in the sky through technology advancements would probably find me laid to rest, clutching my firearm.
@@sambraswell8388: There are very good technical communities where people care deeply about facts. If you want to learn, it's not that difficult. But general social media, where everyone has an incentive to pretend to be experts, is a bad place to learn. But just some basics will get you a very long way.
@@jeschinstad Thank you. I valve your experience and knowledge.
@@jeschinstad
I suspect a lot of ppl watch these types of vids for exactly that reason.
The problem is unless one has some baseline then how are ppl to know what's true & what's false.
Great video Rob!
Just went to airport and showing phone pass .....the company placed on a spot and scanned.... because it was open.... dodgy
anlattıklarınızın ne olduğunuda anlamadık hala tor,p2p,hyphanet nedir ne işe yarar anlamadım.hyphanet kurdum açtım bir yazı ve frefoxumu gizli aramaya aldı fakat bi özellik getirmedi kaldırdım.
Great channel
videolarda dil yazı sorunu.cansız videolarda chromede kısmi ücretsiz olarak altyazı ve sesli okuma çözüm bulsakda oda berbat canlı yayınlarda çözüm bulamıyoruz.otomatik altyazı çeviri bile kapatılıyor.altyazılar çok hızlı takip edemiyoruz.dil ilk önce kelime kelime öğrenmeli sonra cümle ve dilbilgisi.malesef bizim dilde rakam ve harflerde benzerlik var.0,0,9,g,ğ,h vb ayrıca p,b,t,d gbi ayrımı bitişikmi yazılır çözemedik.ayrıca bel altı da çoğunlukda.örnek seksen,amca,sigorta eksik gibi.argo da var.q ve w da yok. dilimiz güzelde berbat ettiler yabancı kelimelerde doldu..
Tails OS is good. You can boot it with a CD image
Yes it is good
malesef sadece youtubede çeviri eklentileri var bütün videolarda ve youtube canlıda çeviri yok.ücretsiz bulamazsınız buda ek para yükü.
What about decentralized vpn?
Works great for normal privacy, but any government or APT will own you pretty quickly unless you use human shields. But if you're a Pablo Escobar or something, you can definitely do it, for instance live migrating LXD servers running Wireguard.
@@jeschinstad I'm not superbly tech-head or know the ins and out of computer networking, coding, or hardware. But have you heard of Deeper Network devices? *edit: just curious about your opinion on the company's tech.
@@couchpotatter: No, I hadn't heard about that, but on their website, they make this claim: «Comes fully loaded with the world’s first and only decentralized VPN»
Now if you were able to impplement something that would allow me to access my local machines over the internet safely, now that is something i would be willing to pay for.
You can already do that lol it’s called SSH
@@fokyewtoob8835 silly boy, u have no idea what we are talking about...
You can use Wireguard for that. Unlike Tor, it works with all traffic and is quite simple to use. Unlike these VPN services you buy, it's just software that you install on your PC and acts like an extra network card, with its own sets of IPs.
@@fokyewtoob8835: Yes. These days, I'd rather recommend Wireguard for that type of use and instead use SSH on top. The benefit of Wireguard is that it doesn't depend on static addresses; as long as one of the nodes are reachable over its previous IP, peers will automatically learn how to connect.
@@jeschinstad valid point
Great video! 😊
Oh how those three letter agencies hate anonymity and encryption. Truecrypt disappeared didn't it? Ever wonder why?
It's pretty clear why. You are probably best off just using the fort VeraCrypt these days. They did a security audit and fixed bugs that were present in the last version of TrueCrypt
I have never wondered why. TrueCrypt was replaced by Open Source implementations like VeraCrypt.
My kind of subject
As usual!!! Thx
Don´t fool yourself. The encryption was written and those who wrote it, has the keys...
Great video, but you forgot about Tails. EDIT: Never mind - you mentioned it at 16:48.
Loved this!
CSIS in Canada is 4 letters 😉😂👌
I too enjoy netscape
Meshtastic using LoRa
Thor is the god of thunder. Loki is the god of deception.
I stream 1080p-1440p video over Lokinet
Wow. I don't know how you can manage that with the upload speed that's pretty horrendous.
@@robbraxmantech Netflix says you need 5 Mbps to stream full HD content and a data rate of 25 Mbps (megabits per second) for 4K Ultra HD content.
@@linsqopiring6816: The issue is latency, not bandwidth. At some point, while you _can_ stream over header-stripping overlay networks, you will prefer to just download in advance. And there's no value of adds on these networks, since your identity cannot be proven, so nobody will pay for it. Non-streaming codecs are far more efficient, making it far more appealing.
@@jeschinstad Latency is a non issue for streaming videos since video players already buffer a certain amount. The video player IS actually downloading in it advance.
"And there's no value of adds on these networks, since your identity cannot be proven, so nobody will pay for it."
Can you rephrase that ?
@@linsqopiring6816: Buffering is a smaller issue for shorter videos because the buffering takes place before the video. For longer videos, you get lots of breaks when you run out of buffer, which you invariably will because latency quickly adds up, as Grace Hopper so eloquently illustrated.
For ads, if you pay for visitors on my site, you need to know that those visitors are actually unique, because otherwise, I could just inflate my numbers to make you pay more or just invent visitors. With Tor, you can't prove unique visitors, hence advertisements are useless.
So interesting
The ONLY solution is being in a network where webpages are downloaded to you randomly throughout your day. We must become willing participants in random downloads on our computers as a condition of participation. Each request we make must be just that, a request we may or may not be served. Each request must be delayed to be accompanied by random requests NOT explicitly made.
I'm fairly sure I got on someone's list for doing that! It was a Firefox add-on that 'clicked' on *every single link* on the page you were reading. In the background it would download the document at the URL and discarded it, but it would stop early if you clicked on a new link. It was used to mess up advert tracking more than visiting dodgy sites. Unfortunately I think it might have swept up a few Al Quaida (or however it's spelt) links. 🙂 I'm not a baddie! I'm really very boring! Google web analytics told me my website (for my son's kindergarten in Australia) was being read by the folks at Fort Meade. 🙄
Yes, it's a good idea. Tor should have a very high latency implementation that makes timing attacks less feasible.
Lol
Like leopard stripes for zebra spots and any which way
Bit Caesars senate though..
Or nuclear epstein...
Everyone sharing in guilt just means open season autogenda magic
Martial law another more surgical way
That's when it matters that as a surveyor George Washington kept his eye on a plot he saw and wanted then eventually obtained by multi tasking the area into the territory they came to need to occupy and secure strategically.
@@Mr0rris0 exactly
google must be destroyed.
WHAT WE DO WHIT ANTIVIRUS APP . OR HOW I NAME IT I DONT KNOW THEY ARE REALY BOURING THEY COME TO MY COPPUTER WHIT OUT I ASK FOR THEM WHAT WE CAN DO TO STOP THIS ANTI VIRUS PROGRAMS** i realy dont know nothing about this ? is this programs good or not . i dont have nothing to hide , but if its posibile to somebody block my PC if i dont have this programs ??
This is pretty cool that someone's ACTUALLY talking about FreeNet & LokiNet & I2P
There's seriously almost no content on them here
@“Can’t” Never CouldReally ? where ?
@“Can’t” Never Could Yeah but a few directions would be nice
Stuff Marvel comics. Loki and Thor are older than Christianity by a long way! It's a bit like saying you can only find the real Jesus in the Freak brothers comics
Hi Rob, please can you explain which mobile devices has been used by black hat hackers and journalists who works in dictatorial states? Thanks
There's only two. Pinephone and Librem. Most phones have their radio permanently switched on and can easily be owned remotely. With new phones, the radio is in the SoC, making it theoretically impossible to make them safe.
like using the old Silk Road 😂
I research nuclear studies and all sorts of illegal chemical manufacturing in the open with 0 care. Anarchist cookbook jolly Rodgers cookbook full recipes and such
Don't use phones or internet problem gone
And you say that as you type it in on one or the other.😂
What if epstein really did kill himself because he felt guilty. Lmfao
orbot is bunk.
🙂
Don't believe computers are private. In order for privacy. You have to put the hardware in a Faraday cage and hope it is sealed.If it is not sealed a near by computer will act as a bridge. There is a peer to peer that is unknown. I observed it talking on 462 mhz .I observed it advertising it's self every so often in the Faraday cage.before I put it in the Faraday it would not stop talking on 462 mhz. I setup a laptop near the computer in the Faraday cage because i need it.long after I put it in the Faraday cage. The next time the computer advertised it's self they both started screaming on 462 mhz. The only reason i know this is because I had a scanner on . Every time I turned on my the mobo I bought for my gpu to run llm's on. It made alot of noise on 462 mhz. So i put in a Faraday cage because I didn't want to lose my hardware to the FCC. I found out all this.
Thor and Loki is NOT from the marvel comics!! 😤
LOL. It is not? I just looked up the movie and it is from the Marvel Universe
@@robbraxmantech try scandinavia (and some more countries) about a thousand years before the marvel comics... 😉
Marvel is the you know whos and they have made a mockery of our cultures and traditions.
It's Norse mythology. I've known that since grade school. But then I'm not much of an IT geek.
That's an untrue statement. It IS (also) from the Marvel comics. The fact that it's _originally_ from Norse Mythology doesn't change that fact.
I can use Tor to access email, ssh, VOIP. anything that is TCP base... correct yourself.
Speak ACCURATELY. Tor Browser vs Tor Routing? Which is repeatedly explained
@@robbraxmantech: This distinction does not exist. Tor Browser is simply a browser that uses Tor for its traffic, along with some other things like tracking leaks.
😄 👌👍
NKN
Android malware is darknet.