@@robbraxmantech If i got u right, it isnt rocket-sience, but "we" have to learn continuously! I've to learn a lot. Thx and best wishes for you and your loved ones!
Nice to hear the term "OSI" again. It reminds me of my certification testing days. It also reminds me that in reality programming often blurs the distinct lines of the OSI model because modern protocols and applications frequently operate across multiple layers simultaneously. Protocols like HTTP/3 integrate session management and retransmission directly, which traditionally belong to different OSI layers and real-world implementations like TCP/IP don't strictly adhere to the OSI model, leading to overlaps in responsibilities between layers. But, that's just life.
@@SpaceCadet4Jesus Yes, it was always impossible to fully line up the internet protocol layers with the academic ISO OSI model. Still, the ISO OSI model is still a good base to design new protocols.
This is all very interesting. Was amazed at the information given from the /geo/ page. I went to the page on a box booted into Linux, then a Linux virtual box hosted on windows, and windows itself. Was amazed at how accurate the information was. Then I booted into tails and went there through tor. It's amazing difference.
People in other videos or sites keep talking about vpn this and that but never talks about the useragents of the browser or the cookies. This video adds more depth to the problem of people not being secure online,
You are secure. This is merely a misunderstanding of how the internet has to work, and how it is always worked since the Inception of the internet. Maybe we should just go back to teletype, where you receive a long string of information and you have to interpret, parse, and format it and only then read it. The internet as we know it would die.
Interesting chat Rob. The United States Cybersecurity Institute published an article titled "THE IMPORTANCE OF CYBERSECURITY FINGERPRINTING: A DETAILED GUIDE" It was published on April 22, 2024. I caught this before you posted this. Hmmmm....
Great video Rob! I love this format, it helps us follow along and the break down in segments is perfect. I appreciate the hard work you put into your weekly videos. Thank you 🙏😎
One indication that you have been flagged for inconsistent identifiers is when you are presented with captchas and other verification steps that you don't get when using an unprotected browser not on VPN.
these days you can get human identifier any step you do. Register a new account, access web site, whatever. This is made to prevent from bot/automatized activities first of all, not to get your unique fingerprint
A good thing to watch for, sure, but you can get a pile more captchas and similar simply by exiting from a known VPN node, so it is equally important that people don’t freak out about it inappropriately.
Thank you for doing what you do , at this moment in time I'm literally learning and going through the Hard Knocks of reality with vpns your channel is the only one that I can find that tells the truth and the realities with everything to do with online and networking don't listen to the haters they're either Bots or your competition being jealous, keep doing what you do !!
Rob I love your Videos and used to love Tech.I have had VPN'S and found out that you are correct.Not to mention so many things through the Year's that have turned me off.I also love the video I seen from you about other Devices not just android.Thanks for sharing all your incredible information for others.Keep up the Awesome Work.I am Hugh fan of all your work.💯✌️
Some governments have outlawed them. And more and more are starting to do so. Brasil is one outside of China who went public about targeting people using VPNs.
This is fascinating. You explain the privacy issues and how they are caused without 'confusing people' with too much technical details but providing enough details that they can investigate further for themselves. What I really like is that you explain some simple 'techniques' and procedures that can be used by all to 'reduce their chances of being 'tracked' on the internet and in their daily life. These techniques, when used, will certainly bring a feeling of control to people as they go about their daily life with some privacy. Thank you. Appreciated.
I tested the brax site with three different browswers, cookies off, four different VPN's with each unique visit. In every single instance, the fingerprint remained the same as did the OS and the time zone no matter the location of the VPN server. So much for presumed privacy. It's 1984 or worse! George Orwell was right, Big Brother IS watching you!
This is a misinterpretation of what's required to deliver website data in a form that your browser can understand. A website has to have at least basic information about who it is talking to in order to know how to send you data that will format properly in your browser. If the internet was to stop this, then they would just send you a long string of data and you'd have to interpret, parse, and format it and none of that would be easy or fun so basically the internet as we know it would die.
Brazil can easily detect if a user uses a VPN by looking at the IP address of the VPN server that a user connects to and also by examining the traffic. Wireguard and OpenVPN have very specific profiles and are constantly blocked by China for example. So using a VPN would probably not prevent hefty fines.
Do not have a device. Go back to REAL life. That would screw them up the most. Be face to face, person to person, pay in cash, only buy local physically.
@@User-w7ckl I agree, if it wasn’t for my job app I would have just an old basic phone that isn’t “smart” Smart actually means “ self monitoring and reporting technology” 🤬
Wow, thank you Rob - SO many views in such a short amount of time, so many people want this, less tracking because we don't want to be spied on, doesn't mean we are up to no good either.
No such thing as privacy to any degrees even in the slightest. Want a tiny amount of privacy?..you'll have to get rid of your internet system, but then,there is no total privacy any more.
Agreed. There has never been total privacy at any time in anyone's life, except in death. Even when you drive your car, the shape of your car, the color of your car, and the license plate number appears for all to see. If you buy anything in the store and don't pay cash, then it's all trackable, not easily, but still trackable.
I use private secure DNS and TH-cam could care less. DNS is a private request between my computer and another computer asking for the IP address of TH-cam. Once the the connection is made, DNS is not involved anymore. Perhaps you had another situation specifically on your setup.
@@SpaceCadet4Jesus If I turn it on, youtube is super slow to the point of unusable, the screen is a bunch of placeholder graphics, just white and gray--for a long delay or even indefinitiely. If I use godaddy or google DNS, very fast populating the screen. They're doing something involving DNS. Using private secure DNS has no impact that I can tell on other sites, just youtube.
There are so many privacy threats that can defeat a VPN it's quite onerous. But watch to the end because there are some powerful ways to fight back. Rob, why the time change for the upload? Just curious.
Great information as always thank you for sharing this. :-) p.s Rob could you explain maybe in another video how the protocol QUIC used by Google is so dangerous to security as it cannot be inspected by deep packet inspection on even a NG Firewall so generally we block it, but then the session re establishes via TCP but what exactly is the capability of Google QUIC. It seems to me like they can control and do almost anything hidden from you.
QUIC is a UDP connectionless transmission protocol with TLS 1.3 encryption built in. It facilitates your normal connection into a much faster, more secure and flexible transmission method. It uses techniques that, previously only were used in a VPN, except that it's much faster. "They" are not doing anything nefarious or hidden or controlling to you.
Rob, thank you for all you do for us. You have taught me so much about privacy. I appreciate you so much. I also use your email, sms and vpn service. Thanks again Rob!
I think this man rob provides a very important service or insite for everyone ,everything right now and for the future. Biggest worry is the speed of technology is moving beyond our current status of understanding and we may end up caught amongst serious repercussions big price to pay. It doesn't matter if usually i would keep things simple. This tech is beyond that. So adjusting and understanding is crucial.
If people really want to have a good crack at remaining/securing their web-traffic, use VPN and the TOR network. But the absolute best way is to abstain from the internet altogether.
Abstaining from the internet all together, it's like saying don't drive a car ever again, or, sell all you own, change all your clothes and become Amish. No thanks!
I remember a unique piece of software that changed the pointer vectors to return the values of various hardware type systems and os's, used it to download specific Mac software from an apple specific platform directly to an XP based machine . Without any issues. It answered any request with any system I required of it including some cellular phones. Thereby spoofing the site.
That software is not unique, and is still available, it's merely a user agent changer which gives different values to a website. I used one decades ago and found it was a waste of my time. The website return data was so convoluted my browser couldn't understand it and formatted it improperly on the screen. Only for the ultra paranoid.
VPN makes it easier to fingerprint you.Also trying to hide your fingerprint makes you stand out like a sore thumb it causes the result your trying to hide. The "trick" with fingerprinting is the grey rock approach. Blend in with the general masses and not do the huge neon sign over your head whilst you are jumping up and down waving your hands in the air screaming at the top of your voice... look at me i am trying to hide something.
@@michaeldawson6309 it's probably not a perfect solution, but I have various virtual machines running on my Linux system. The "Chrome" icon uses ssh to launch chrome on a virtual machine and is my only access to Google. If I did Meta, I would have a similar setup for it (different virtual machine, different account name). At least then it might be contained.
❤Thank you for informing and educating I appreciate you. Definitely watching your other videos. Well damn!!! No wonder I feel like I am be stalked! I actually think I am being stalked by people from India mostly men & I don’t think they are the only ones. I don’t know anyone from India. My neighbor above me might be from India and they are a programmer and for whatever reason I think they are invading my and my daughter’s networks and my devices. I’ve seen some odd behavior in public by men like they are out capturing people’s device data, which sounds crazy but it seems like it’s happening. Some of my social media platforms seem like they are being spammed with accounts from India. I love the recaps.I don’t know what I can do at this point but I will keep trying. I don’t want anybody stalking me or my daughter, or our devices or our networks.
I always figured the gov pushed VPN's for two reasons. One, a false sense of security & anonymity in the citizen and two, if your VPN shows up from a foreign country, then they can say "Section 702"... when "they" spy on you legally 😂
So how do you get around all of this? A lot of sites now ask you to enter a code send by SMS to your phone and wont allow you to logon otherwise e.g. TH-cam. I really hate having to enter these codes all the time. They are making the internet worse.
Screen size, Browsers, geolocation, devices models, dns requests and mac addresses... IP is took as obvious that it will be cloaked. I wont have Windows in the house, also getting GLi travel router set with wire guard on mullvad owned servers is a good daily option.
Rob, if via Windows, I use TOR browser to visit a site, am I giving up my identify? Or is the only safe way to remain anonymous is by TAILs, or Parrot OS's AnonSurf, or Qubes OS, etc?
TOR is an open source project. Words against it look rather like an anti-TOR propaganda. Secret services might certainly make a boom out of a li ion battery like recently reported speculations (or preliminary data), but this just reveal there capability and make many countries and governments invest in their own electronics and software. The end of M$ and US monopoly might be much sooner then ) Same about Pegasus
I would say yes your identity could be compromised by application ID and tracking info which is outside the network layers protected by a VPN or re routed traffic as these only block the IP and session data. I think as Rob explained that you have to keep off Google applications and away from wifi networks as it appears if I understood Rob correctly that Google will use your wifi environment to triangulate your device and since if your logged into a google account they now know where and who this communication is coming from. So if your doing something you want to hide I would say yes use TAILS with a VPN or TOR and BRAVE but never use the device to access Google services else your identified. Anything to comment Rob?
It is funnier when the cell phone (manufacturer from China) simply ignores the DNS settings and uses its own DNS server even with VPN, e.g. because the settings for IPV6 are fixed and cannot be changed or switched off.
IPV6 uniquely identifies you, wherever you are in the world, much more than IPV4. I know we're all supposed to switch to IPv6 but it's hard to get the general public to move onto anything new.
My mom has difficulty using Brave for banking. She can't quite describe what it's doing, she doesnt know the terminology, just that she can't log in to banks, everything else logs in fine. Any idea where I should start looking to find her problem?
in your case it's a bank account, and in case of US presidents it's about the big red button the more time senior people spend at the beach, the better
I'm hoping Rob will talk about this some time. There are extensions that do this. I'd like to get his take on how useful they are. Seems like a cool idea.
Is it that the browser gets fingerprinted, or the actual device itself is fingerprinted? you cant connect to a site without a browser, so maybe it's the browser getting fingerprint?
Both. I have two identical computers. I can take the hard drive on one and plug it into the other and be up and running instantly. When I use a function that uses tracking ("We recognize your device so you don't have to log in.") when I swap the computer the automatic login does not work, even though the hard drive is the same one. They are reading the hardware somehow.
@@glasslinger Good initial observations. Maybe query one of the chattybott LLMs about it and see if it can help you "troubleshoot" it to a solution. Then you can run the test again and see if it made any difference. There are also websites that can test for leaks and other things. Therer may be different setups and configurations with regard to browser, security, debloatation apps, vpn settings, hardware configs that could fix it. Let's look into it more.
If you are using CalyxOS operating system on your phone and tether it to an Android OS phone to use Google Maps App while connected to the internet via a cellphone system are you creating any permanent identifier problems on the CalyxOS phone? In other words, will Google put permanent identifiers on the CalyxOS phone?
Google will not so long as your not logged in. However your cell provider may have logs of which devices connect to their services then you get geo tagged and it links right back to you ;) use your imagination 😮
What privacy can you gain from running a desktop virtual machine which is running anonsurf or another VPN within it? Does that really provide any privacy?
It is sad when it feels like one needs several college courses just to protect privacy.
This is what big tech wants, for you not to know
@@robbraxmantech
If i got u right, it isnt rocket-sience, but "we" have to learn continuously!
I've to learn a lot.
Thx and best wishes for you and your loved ones!
And nothing ever works correctly on layers 1-4 because of drivers. 😮 And the ISP.
I have a feeling that this Google or big tech companies will do something to stop spreading videos like this
@@crutsenor Linus tech tips got a strike for showing how to degoogle
You're the first person I've come across since the 1980s to refer to the ISO seven layer architecture! Good to know it's still alive!
OSI?
@@JeremyHurley-jv7kl ISO OSI Model
Wow! a mention of the ISO system! Never thought I would hear about that again either!
Nice to hear the term "OSI" again. It reminds me of my certification testing days.
It also reminds me that in reality programming often blurs the distinct lines of the OSI model because modern protocols and applications frequently operate across multiple layers simultaneously.
Protocols like HTTP/3 integrate session management and retransmission directly, which traditionally belong to different OSI layers and real-world implementations like TCP/IP don't strictly adhere to the OSI model, leading to overlaps in responsibilities between layers.
But, that's just life.
@@SpaceCadet4Jesus Yes, it was always impossible to fully line up the internet protocol layers with the academic ISO OSI model. Still, the ISO OSI model is still a good base to design new protocols.
You're a great teacher, Rob. Thank you.
the future will be the A.I trying to exploit me VS the A.I. trying to protect me. And so it begins!
It will NOT be trying to protect you
@@herefornow9671you didn’t get the comment
3am and I'm getting my dose of nighttime de propogandaing and a punch of reality
3:42
Same
The propaganda lately has been worse than I’ve seen in years. 2024 has been wild so far.
😁
I thought this channel was honest your saying it’s propaganda !!?
This is all very interesting. Was amazed at the information given from the /geo/ page. I went to the page on a box booted into Linux, then a Linux virtual box hosted on windows, and windows itself. Was amazed at how accurate the information was. Then I booted into tails and went there through tor. It's amazing difference.
Thank you RB for all that you do.
People in other videos or sites keep talking about vpn this and that but never talks about the useragents of the browser or the cookies. This video adds more depth to the problem of people not being secure online,
You are secure. This is merely a misunderstanding of how the internet has to work, and how it is always worked since the Inception of the internet.
Maybe we should just go back to teletype, where you receive a long string of information and you have to interpret, parse, and format it and only then read it.
The internet as we know it would die.
This video is pure gold. I've been looking for a way to share this info in Lehman's terms. Thanks so freaking much man.
Interesting chat Rob. The United States Cybersecurity Institute published an article titled "THE IMPORTANCE OF CYBERSECURITY FINGERPRINTING: A DETAILED GUIDE" It was published on April 22, 2024. I caught this before you posted this. Hmmmm....
smh
Great video Rob! I love this format, it helps us follow along and the break down in segments is perfect. I appreciate the hard work you put into your weekly videos. Thank you 🙏😎
Lol i like the pfp. Calyx is great 👍🏻
One indication that you have been flagged for inconsistent identifiers is when you are presented with captchas and other verification steps that you don't get when using an unprotected browser not on VPN.
That happens to me quite often. Thanks for the info.
these days you can get human identifier any step you do. Register a new account, access web site, whatever. This is made to prevent from bot/automatized activities first of all, not to get your unique fingerprint
Yeah it's has been pissing me off and has been making me wonder if the captchas are a method for getting extra data somehow.
A good thing to watch for, sure, but you can get a pile more captchas and similar simply by exiting from a known VPN node, so it is equally important that people don’t freak out about it inappropriately.
Captchas are made to train AI. Especially when you have 10 in a row.
Thank you for doing what you do , at this moment in time I'm literally learning and going through the Hard Knocks of reality with vpns your channel is the only one that I can find that tells the truth and the realities with everything to do with online and networking don't listen to the haters they're either Bots or your competition being jealous, keep doing what you do !!
Damn, you got all KINDS of goodies up in here. 🤜🤛
Go ahead brutha. Do your thing 👍
Rob I love your Videos and used to love Tech.I have had VPN'S and found out that you are correct.Not to mention so many things through the Year's that have turned me off.I also love the video I seen from you about other Devices not just android.Thanks for sharing all your incredible information for others.Keep up the Awesome Work.I am Hugh fan of all your work.💯✌️
If VPN worked, the Federal Government would have outlawed it already.
But also wouldn’t have the government banned this channel???
Where does it end???
VPNs do work. They encrypt and protect traffic across the internet.
@@petedavid5127 encrypted from us, not them.
Some governments have outlawed them. And more and more are starting to do so. Brasil is one outside of China who went public about targeting people using VPNs.
Tell us in next video about pay apps vs swipe credit card vs PayPal to pay online vs. Pay apps at store register?thanks
This is fascinating. You explain the privacy issues and how they are caused without 'confusing people' with too much technical details but providing enough details that they can investigate further for themselves.
What I really like is that you explain some simple 'techniques' and procedures that can be used by all to 'reduce their chances of being 'tracked' on the internet and in their daily life.
These techniques, when used, will certainly bring a feeling of control to people as they go about their daily life with some privacy. Thank you. Appreciated.
Google and Meta are so evil.
About the same as living in a small town
I tested the brax site with three different browswers, cookies off, four different VPN's with each unique visit. In every single instance, the fingerprint remained the same as did the OS and the time zone no matter the location of the VPN server. So much for presumed privacy. It's 1984 or worse! George Orwell was right, Big Brother IS watching you!
This is a misinterpretation of what's required to deliver website data in a form that your browser can understand.
A website has to have at least basic information about who it is talking to in order to know how to send you data that will format properly in your browser.
If the internet was to stop this, then they would just send you a long string of data and you'd have to interpret, parse, and format it and none of that would be easy or fun so basically the internet as we know it would die.
im new, where is this site?
Listening while working, will need to come back and take 📒 with a 🖋 loads of good advise 😊 thinks!!!
Brazil can easily detect if a user uses a VPN by looking at the IP address of the VPN server that a user connects to and also by examining the traffic. Wireguard and OpenVPN have very specific profiles and are constantly blocked by China for example. So using a VPN would probably not prevent hefty fines.
How about using a VPN using UDP, TCP and port 443 or 80
Would they be able to block i2p?
but they take into account not only port, it's a more complex data harvesting
Would it help to spoof your location before you turn on vpn?
if you know how to spoof your location without vpn, then why do you need vpn at all
This was a good video. Never thought about using running multiple browsers for different things.
Do not have a device. Go back to REAL life. That would screw them up the most. Be face to face, person to person, pay in cash, only buy local physically.
Absolutely
That's not always possible, companies force you to use their apps, or mobile stuff even for basic things
For instance, banks are becoming branchless and cashless, leaving you with no choice but to use their banking apps
@@User-w7ckl I agree, if it wasn’t for my job app I would have just an old basic phone that isn’t “smart”
Smart actually means “ self monitoring and reporting technology” 🤬
@@enki9006 that is for hard disks 😂, but good one
I love your channel. Thanks for all useful info!
Wow, thank you Rob - SO many views in such a short amount of time, so many people want this, less tracking because we don't want to be spied on, doesn't mean we are up to no good either.
Great info! Appreciate your work. Would Docker and/or containers either if it is an extension, or add-on, or app stop the data collection?
Some
No such thing as privacy to any degrees even in the slightest. Want a tiny amount of privacy?..you'll have to get rid of your internet system, but then,there is no total privacy any more.
Agreed. There has never been total privacy at any time in anyone's life, except in death.
Even when you drive your car, the shape of your car, the color of your car, and the license plate number appears for all to see.
If you buy anything in the store and don't pay cash, then it's all trackable, not easily, but still trackable.
Thanks Rob🔥
Awesome, i already knew many of this but now im concerned that my empty TP roll is tracking me...
OH yeah, thank you for NOT saying, "OKAY" after each talking point.
Your work is very helpful to the society ✊
TH-cam suddently quit working in Firefox and it took me weeks to figure out that the issue was that they had begun thwarting private secure DNS.
I use private secure DNS and TH-cam could care less.
DNS is a private request between my computer and another computer asking for the IP address of TH-cam. Once the the connection is made, DNS is not involved anymore.
Perhaps you had another situation specifically on your setup.
@@SpaceCadet4Jesus If I turn it on, youtube is super slow to the point of unusable, the screen is a bunch of placeholder graphics, just white and gray--for a long delay or even indefinitiely. If I use godaddy or google DNS, very fast populating the screen. They're doing something involving DNS. Using private secure DNS has no impact that I can tell on other sites, just youtube.
@cjburian1 What is your DNS source address? I want to try it myself, to troubleshoot it.
Thank you good sir
You should publish a printed roadmap, RB!
There are so many privacy threats that can defeat a VPN it's quite onerous. But watch to the end because there are some powerful ways to fight back.
Rob, why the time change for the upload? Just curious.
screwed up
@@robbraxmantech lol, well it was a nice screw up because I got to see it sooner.
Notice that Brave browser (Linux) is only for x64 systems.
Thanks for the video once again. Cheers.
Great information as always thank you for sharing this. :-)
p.s Rob could you explain maybe in another video how the protocol QUIC used by Google is so dangerous to security as it cannot be inspected by deep packet inspection on even a NG Firewall so generally we block it, but then the session re establishes via TCP but what exactly is the capability of Google QUIC. It seems to me like they can control and do almost anything hidden from you.
QUIC is a UDP connectionless transmission protocol with TLS 1.3 encryption built in. It facilitates your normal connection into a much faster, more secure and flexible transmission method.
It uses techniques that, previously only were used in a VPN, except that it's much faster.
"They" are not doing anything nefarious or hidden or controlling to you.
Amazon does this a lot too
Great information. Explains a great deal. Thank you!
Rob, what a huge wealth of info that you are sir. I subscribed and will investigate more. Thanks!
Fantastic breakdown and explanation of the subject
Been on linux for years But using Google so must change now. Thank you.
Rob, thank you for all you do for us. You have taught me so much about privacy. I appreciate you so much. I also use your email, sms and vpn service. Thanks again Rob!
I think this man rob provides a very important service or insite for everyone ,everything right now and for the future.
Biggest worry is the speed of technology is moving beyond our current status of understanding and we may end up caught amongst serious repercussions big price to pay.
It doesn't matter if usually i would keep things simple. This tech is beyond that. So adjusting and understanding is crucial.
heard too many say, Oh 'I have VPN' as if that's a complete protection.
Gullible people are being sold a product that is not made for the purpose they're trying to sell it to you for.
Everyone else silent about privacy risks, ignoring or supporting these.
excellent information .... its just unfortunate that our tools of defense are diminishing in every phase of updates to big tech OS's. and hardware😮💨
I get hit with not a robot games when I use Brave, and Brave + VPN I'll be solving games all day.
Great insight into fingerprinting , loved it.
If people really want to have a good crack at remaining/securing their web-traffic, use VPN and the TOR network. But the absolute best way is to abstain from the internet altogether.
Abstaining from the internet all together, it's like saying don't drive a car ever again, or, sell all you own, change all your clothes and become Amish.
No thanks!
I remember a unique piece of software that changed the pointer vectors to return the values of various hardware type systems and os's, used it to download specific Mac software from an apple specific platform directly to an XP based machine . Without any issues. It answered any request with any system I required of it including some cellular phones. Thereby spoofing the site.
That software is not unique, and is still available, it's merely a user agent changer which gives different values to a website. I used one decades ago and found it was a waste of my time. The website return data was so convoluted my browser couldn't understand it and formatted it improperly on the screen.
Only for the ultra paranoid.
Anonymity requires multiple things. Use a VPN, clear cookies, and disguise fingerprints.
I think once you log into Meta or Google with a valid Id your toast no matter what hiding technique you use.
@@michaeldawson6309😂
VPN makes it easier to fingerprint you.Also trying to hide your fingerprint makes you stand out like a sore thumb it causes the result your trying to hide. The "trick" with fingerprinting is the grey rock approach. Blend in with the general masses and not do the huge neon sign over your head whilst you are jumping up and down waving your hands in the air screaming at the top of your voice...
look at me i am trying to hide something.
@@michaeldawson6309 it's probably not a perfect solution, but I have various virtual machines running on my Linux system. The "Chrome" icon uses ssh to launch chrome on a virtual machine and is my only access to Google. If I did Meta, I would have a similar setup for it (different virtual machine, different account name). At least then it might be contained.
And use a dedicated machine that has never been connected to anything without the VPN active.
Love Brave all thanks to you sir
Vpns are best used as a point of encryption and safety net to prevent dmca notices from your ISP lol
and here we thought it was all about the lies and scams and sheety peeps....... what were we thinking?!? :(
Great content, what about QubesOS without using Google?
Well done.
Great information! Thanks
❤Thank you for informing and educating I appreciate you. Definitely watching your other videos.
Well damn!!! No wonder I feel like I am be stalked! I actually think I am being stalked by people from India mostly men & I don’t think they are the only ones. I don’t know anyone from India. My neighbor above me might be from India and they are a programmer and for whatever reason I think they are invading my and my daughter’s networks and my devices.
I’ve seen some odd behavior in public by men like they are out capturing people’s device data, which sounds crazy but it seems like it’s happening.
Some of my social media platforms seem like they are being spammed with accounts from India. I love the recaps.I don’t know what I can do at this point but I will keep trying. I don’t want anybody stalking me or my daughter, or our devices or our networks.
Curious to get your take on the pager incident..
Good job
👍👍👍 great info!
Thank you❤
YT quite often unsubscribes me from your channel. Just thought you'd be interested to know.
I always figured the gov pushed VPN's for two reasons. One, a false sense of security & anonymity in the citizen and two, if your VPN shows up from a foreign country, then they can say "Section 702"... when "they" spy on you legally 😂
I never thought about the possibility of them being able to use the article 702 if using a VPN. But that just might be legal for them to do so
Virtualization.
you know that knocking at the door and loud shouts like "Police open the door" is the best de-virtualization
rob your a pot of gold and a great man thank you brother for being great teacher
Changing mac address also doesn't work anymore.
works for what? Of course it works, it's an important functionality. Almost every phone should do that these days
where it doesn't work? it works perfectly
So how do you get around all of this? A lot of sites now ask you to enter a code send by SMS to your phone and wont allow you to logon otherwise e.g. TH-cam. I really hate having to enter these codes all the time. They are making the internet worse.
Privacy is basically impossible to achieve lately because of that . But remember, it's aaalways for your safety 😉
😂 I wish they would create a device with no Os that ties to none of these sun guns
They already did, it's called the vacuum cleaner.
Good channel.good video.subbed.
Screen size, Browsers, geolocation, devices models, dns requests and mac addresses... IP is took as obvious that it will be cloaked.
I wont have Windows in the house, also getting GLi travel router set with wire guard on mullvad owned servers is a good daily option.
The commonality of device's identification versus the probability of occurrence calculated, gets you what? Fingerprint...
based channel! thumbsup
It’s overwhelming and intimidating for the average person
Thank you! Can you believe they we pay them for their services as well! Crazy! Over the top illegal. The prison planet just went to a new level!
Rob, if via Windows, I use TOR browser to visit a site, am I giving up my identify?
Or is the only safe way to remain anonymous is by TAILs, or Parrot OS's AnonSurf, or Qubes OS, etc?
TOR lol you are not anonymous on TOR. Naval intelligence created operating system. C.I.A/I.S.I.S controlled gateways.
TOR is an open source project. Words against it look rather like an anti-TOR propaganda.
Secret services might certainly make a boom out of a li ion battery like recently reported speculations (or preliminary data), but this just reveal there capability and make many countries and governments invest in their own electronics and software. The end of M$ and US monopoly might be much sooner then )
Same about Pegasus
I would say yes your identity could be compromised by application ID and tracking info which is outside the network layers protected by a VPN or re routed traffic as these only block the IP and session data. I think as Rob explained that you have to keep off Google applications and away from wifi networks as it appears if I understood Rob correctly that Google will use your wifi environment to triangulate your device and since if your logged into a google account they now know where and who this communication is coming from. So if your doing something you want to hide I would say yes use TAILS with a VPN or TOR and BRAVE but never use the device to access Google services else your identified. Anything to comment Rob?
anon surf is TOR for all apps on OS
surprise surprise my comment on the truth about what TOR really is was deleted.
I wonder why.
If they’re cooking walkie talkies that use GPS or misguiding JDAMs in Ukraine what chance do you think you stand a chance?
Been Gangstalked the last 5+ yrs they still hack me using stingray devices & whatever weird stuff they’re into
Hi Rob. Can you do a video about chat control in eu?
Hey Rob, would you recommend an Linxus OS above any other OS's in your opinion? Thanks
Thank you so much
Now youtube will not show me my comment, error msg only! 😂
@Rob Braxman Tech: what about hardware VPN? such as Deeper Network products? Do those work better than software VPN?
It is funnier when the cell phone (manufacturer from China) simply ignores the DNS settings and uses its own DNS server even with VPN, e.g. because the settings for IPV6 are fixed and cannot be changed or switched off.
So does apple and Google
@@robertbslee4209 thanks for the info. i didn't know that.
IPV6 uniquely identifies you, wherever you are in the world, much more than IPV4. I know we're all supposed to switch to IPv6 but it's hard to get the general public to move onto anything new.
Perfect.
However, it does prevent Starlink from knowing about the torrents I download, which is the only reason I use one.
Then the VPN company gets the torrent reports.
@@robbraxmantech And that matters, why? They don't seem bothered by it. Starlink, on the other hand, has been known to threaten to cancel accounts.
@@JamaicaWhiteMan Government looks at it.. If you're a big fish, they'll hook you soon enough.
@@newworldforward1842 I live in Jamaica. Not going to happen here, and I don't expect the Americans to demand my extradition over it.
You still use torrents in this day and age? Aren't most of them infected?
"they" track everything
Great video as always!
Thank you.
My mom has difficulty using Brave for banking. She can't quite describe what it's doing, she doesnt know the terminology, just that she can't log in to banks, everything else logs in fine. Any idea where I should start looking to find her problem?
in your case it's a bank account, and in case of US presidents it's about the big red button
the more time senior people spend at the beach, the better
So how does organized crime still exist?
That is an 'individual person' hacking system. see Greed, corruption, morals etc.
Organized crime and Government is really one and the same. One can't live without the other.
What version of linux do you recommend. Would you recommend a different version?For someone whose hobby is video games?
Mr Rob, Does your vpn cover phone calls , you tube social media and web browsing?
User agent switch
I'm hoping Rob will talk about this some time. There are extensions that do this. I'd like to get his take on how useful they are. Seems like a cool idea.
Not useful for hiding anything from trackers...
@@LynyrdSkynyrd.4Ever the point is to not pick up the trackers in the first place.
Is it that the browser gets fingerprinted, or the actual device itself is fingerprinted? you cant connect to a site without a browser, so maybe it's the browser getting fingerprint?
Both. I have two identical computers. I can take the hard drive on one and plug it into the other and be up and running instantly. When I use a function that uses tracking ("We recognize your device so you don't have to log in.") when I swap the computer the automatic login does not work, even though the hard drive is the same one. They are reading the hardware somehow.
@@glasslinger Intersting observations. I wonder what ChatGPT-o1 would say about it all
@@glasslinger Good initial observations. Maybe query one of the chattybott LLMs about it and see if it can help you "troubleshoot" it to a solution. Then you can run the test again and see if it made any difference. There are also websites that can test for leaks and other things. Therer may be different setups and configurations with regard to browser, security, debloatation apps, vpn settings, hardware configs that could fix it. Let's look into it more.
Hard drive serial numbers are one of the hardest components to modify
If you are using CalyxOS operating system on your phone and tether it to an Android OS phone to use Google Maps App while connected to the internet via a cellphone system are you creating any permanent identifier problems on the CalyxOS phone? In other words, will Google put permanent identifiers on the CalyxOS phone?
Are you logged in? Then no
@@robbraxmantech Rob, thank you.
Google will not so long as your not logged in. However your cell provider may have logs of which devices connect to their services then you get geo tagged and it links right back to you ;) use your imagination 😮
How can you be so right about it? Do you have a LIVE test together with a VPN company?
Could you please make a video on DPN?
What privacy can you gain from running a desktop virtual machine which is running anonsurf or another VPN within it? Does that really provide any privacy?
Emails,self identification,not using a killswitch,dont log into goigle accounts when browsing,erase your browser completely..