Название | : | Become Anonymous: The Ultimate Guide To Privacy, Security, u0026 Anonymity |
Продолжительность | : | 28.59 |
Дата публикации | : | |
Просмотров | : | 520 rb |
|
hey man a questionbrwhat do you think of safari and apples security? Comment from : @sarugard9115 |
|
I second the recommendation for Hidemyacc It's a cost-effective alternative to other antidetect browsers and has proven to be efficient for my online activities Comment from : @user-ft8zi5hq4s |
|
20:52 Why is browser fingerprinting not a concern when it’s used for personal accounts? Shouldn’t it be more of a concern because it ties back to you directly? Comment from : @greenhat7618 |
|
Protect your online privacy with an antidetect browser like Hidemyacc or Multilogin Hidemyacc's 7-day trial with 30 profiles is a great starting point Comment from : @user-gl7pg9xx1i |
|
i literally do not fucking care how inconvenient everything is, give me a zone 9 Comment from : @moshin4012 |
|
Stopped watching when recommended Safari as a private/secure browser Comment from : @noodlessoul8356 |
|
Paranoid Comment from : @thesilentgeneration |
|
Ok Comment from : @lugd441 |
|
I would actually add something to zone 3 here and that is to do it yourself This is a lot more work but there are a ton of options for self hosting out there You don't have to lose the functionality of having a subscription if you host your own media server like jellyfin and rip your own movies from disks You can host your own cloud storage provider in the form of nextcloud Many of the things recommended here require you to give up certain functionalities but you may not have to if you are hosting it yourself Comment from : @colbythompson7251 |
|
Google knows EVERYTHING, it's disgusting, even if you disable all the google tracking from settings (which is pretty hard to do), they still know what devices are around you and which ones you accessedbrI don't know why you trust Apple, they are also horrible Comment from : @SagaraUrz |
|
Should I switch to a different browser? (Im using opera gx currently), i'm looking to switch to brave but i don't know if i can transfer my data to another browser Comment from : @aangeles21 |
|
Wow, this video is very well put together I love how you've separated into 3 zones too As an experienced techie, I loved that I was able to skip the basics Thanks guys! Comment from : @mckinleyp |
|
I remember when I was in bootcamp at MCRD and a captain called edward snowden a terrorist and anonymous a terrorist group during a class and as much as I wanted to say something that would of probably screwed me over Comment from : @DragoLuke69 |
|
Instructions wrong,brbrI am now in China on a boat Comment from : @UnknownUser007 |
|
People consider the ones who care about their own privacy a paranoid cult while hiding their heads under the sand and being ignorant about their own basic rights Comment from : @denkozlov4220 |
|
lol Top VPNs No NordVPN?? Edward Snowden uses it!! 😂 Comment from : @colinjames2469 |
|
I maintain two personalities : Anonymous and a Corporate Rat Comment from : @vk0x564b |
|
Need to live a whole double life Different identities with different looks, names, devices, accounts, even grammar Can go really far with it all Comment from : @ChaceBonanno |
|
zone 4:brdon’t drink the tap waterbrcover your face at all times in order so the clouds don’t use ai recognition to track youbrabandon all forms of technologybrlive in a small shed in the middle of the forest Comment from : @enoll218 |
|
12:45 This is especially worrisome, because that company scraped over 30 billion photos brbrMy facebook account has been deactivated since October 2017, so whether or not they managed to scrape deactivated profiles, aside from public stuff is probably something I'll never know? Comment from : @darrellm9915 |
|
Good day, I'm in the states and was long for help with securing my network? Comment from : @lindamora7 |
|
Thanks! Comment from : @USA-RN |
|
Dear CIA, brbrI am just watching this video for educational purposesbrbrDon’t knock my doorbrbrPlease Comment from : @jackcheung4301 |
|
I try to look my self up and i didnt see anything that i know also is it fine to have different emails for different stuff Comment from : @oisme |
|
Subscribed for info Thanks! I don't have anything to hide but curiosity killed the cat and I love science and learning even if not applicable to irl Learning chemistry and security is a red flag unfortunately Comment from : @Anon_Entity |
|
Tip: Do not use a VPN All they do is redirect your traffic to their servers giving them full access to what your ISP usually would see Comment from : @avitld |
|
You talk too fast Take a breath Comment from : @agoogleuser4925 |
|
Just curious; why isn't NordVPN listed in the top 5 VPN list, or even mentioned despite its popularity? Is there security flaws that I'm unaware of? Comment from : @andrehaugvaldstad |
|
Great guide, thank you Comment from : @psilopsychic |
|
GLARY UTILITIES -- Sorry Comment from : @domedana |
|
I use DLARY Utilities Interesting to hear regarding glary utilities and your opinion about it Comment from : @domedana |
|
You are a very smart person Please slow down a little The information you are providing is amazing Thank you so much! Comment from : @domedana |
|
I'm out Just two minutes into the video and the first thing that's advised is to use a password manager that stores the information on a cloud!!! Comment from : @m1k3again |
|
You can also use crypto to buy gift cards online Or non-anonymously buy gift cards online that are shipped to your house, and you can use them online Comment from : @leesweets4110 |
|
19:27 I cant place that classical piece Anyone recall? Comment from : @leesweets4110 |
|
Ive weened myself off google almost completely I do use Youtube (as do you, @Techlore), but I also have a VoIP number through google voice that I use mostly for TOTP 2FA When alternative methods of 2FA arent available, and/or a sign-up telephone number is required If you absolutely have to 2FA through SMS, a VoIP number is the safest way to do it, and its basically a burner number I dont pay attention to if I get spam calls (as it doesnt even forward to ring a real phone); oh, Im sure the text messages and voice mails are piling up, but no one but spammers and these internet services know the number anyway And a VoIP number cant be ported nearly as easily as a cell number Comment from : @leesweets4110 |
|
I would find you lol, Bullshit you will get caught your only making it harder, just don't use home internet and never be at the location of the internet you use simple! Reply if you want to know more lmao! Comment from : @connorguy6033 |
|
03:00 so that is why iphone asks for passcode after restarting moral of story: when about to be arrested, switch off your phone atleast Comment from : @indethbed2546 |
|
Someone he'll p Comment from : @vincentmartinez9355 |
|
The soft of Gaia it really isn’t Comment from : @80795022 |
|
Just explain dude straight to the point Comment from : @48678BA |
|
is kiwi browser good for Android Comment from : @VISTYGH |
|
11:17 Okay so like isn't this channel running using a google account and I suppose you get paid using AdSense so it's not like you give pseudo bank or paypal info because the you won't get paid, it's kinda contradictory Could you please explain how to tackle this?brThank you Comment from : @user-ir6xh2mx9d |
|
could you please do a video on how to install kali Linux on to a USB so it is bootable from USB so i can use it on different machines as I am studying information technology I have wached other videos on how to do this but they have not worked great video loved it Comment from : @scott8964 |
|
Are there people out there that sell things that are already set up for ghost people? Comment from : @waynechung3281 |
|
4:00 Comment from : @razer0072073 |
|
when i realize how shitty my security is Comment from : @asdfoifhvjbkaos |
|
I now have a double A4 spread of bullet points I need to do Comment from : @ht-ve9fe |
|
Hey Techlore, I hope you review and update the scoring test I wanna reach the level of techlore max, I'm quiet close to implementing everything on mobile, however I don't have an accessable desktop or computer, so I don't know what I may supposed to do I don't want even to leave it a mark since I have a laptop that was unable to open just because of a SINGLE Button that was left unfixed and unattached Pretty small problem, but I hope you can make your scoring test fair for every device users Thanks! Comment from : @TheUnbotheredTexan |
|
13:37 mentions not using Tor for personal accounts, though I’ve seen many privacy advocates saying that it’s actually good for people to use Tor for everyday use cases, like surfing the web or checking social media, because more users on the Tor network makes each individual more secure brbrCould you expound on why Tor isn’t best for checking accounts? I’m new to all of this and very much looking to reduce my footprint and regain some privacy Thank you for the fantastic content! New sub Comment from : @AWoozyYouth |
|
The Ultimate Guide to Privacy, Security, and Anonymity:brStep 1: Get rid of the internet, cell phones, or any other connected devices brStep 2: Use a rotary phonebrStep 3: Become an Alpha savage and swing from tree to tree out in the wild Comment from : @Allenb1977 |
|
Is there any privacy and security benchmarking for smartphones like we have many benchmark for performance ? Comment from : @bhalomanus3778 |
|
19:16 I got to get those Comment from : @JacobP81 |
|
11:34 But you needed a Google account to upload this Comment from : @JacobP81 |
|
10:37 I have a lock box and a paper shreder Comment from : @JacobP81 |
|
6:06 Snowden recommends Signal also Comment from : @JacobP81 |
|
Thank you - subscribed! Comment from : @jayceewedmak9524 |
|
I get annoyed that graphene and lineage OS only work with certain phones I'm not that tech savvy and worry about breaking my phone if the OS doesn't work Apparently graphene works best on Pel hones which isn't available in my country Sucks man Really Comment from : @williambetts4417 |
|
Today, one can become truly anonymous only in the Compilation of a decentralized ecosystem of utopia It's the only one I can be 100 sure of Comment from : @ghadermokhtabady2787 |
|
I don't have a smart phone at all so I guess I win Comment from : @PressA2Die |
|
I've long given up on advocacy Most people are either dense, ignorant or stubborn Getting anyone above the age of thirty to change is a thankless task and essentially futile Comment from : @nmiller907 |
|
I’m unknown Comment from : @Artificial608 |
|
Zone 1 alone will take me months I have 2,460 accounts in my Bitwarden vault and I definitely don't use them all My job often requires me to sign up for websites to test whether a coupon code is valid so I have hundreds of abandoned accounts I always put a fake phone number and an old address but I never really considered using completely fake data Ugh Comment from : @justanotherjessica |
|
Nice! Thanks 👍 Comment from : @firecracker3911 |
|
I hope volta wireless is real for phone service Comment from : @luigiramirez29 |
|
Pleaseeeee, you talk about security and being anonymous but you recommend google phones, please tell me you joke Comment from : @legend3656 |
|
farhan estuvo aqui Comment from : @farhonahmed5081 |
|
anyone having trouble using aurora store these days? Comment from : @brotendochill7053 |
|
Thanks! Comment from : @ryanmorgan2876 |
|
Soo ive had a corrupted database message on my iPhone My message are not sending & my phone backup itself without authorization Inever wanted my pic on the cloud Comment from : @sabrinalopez3908 |
|
Awesome infoThanks techlore :-) Comment from : @asittripathy |
|
Does wiping the entire backlog in Linux makes you unsuspicious? I think it's not As any activity creates backlogs, whether it's some kind of dodgy activity or not That's the point when some forensic guys inspect your system Wiping out your entire backlog would make them think that you're hiding something dodgy Isn't it? Comment from : @just_some_bigfoot_hacking_you |
|
Military uses signal when overseas(: it works Trust Comment from : @deadshooter47 |
|
Is Ecosia a private search engine? Comment from : @johncalorino675 |
|
Zone 3 is still useless micro uav drone swarms backdoors built into the hardware from the day its bought microchips in every house thought police govt vpn cracker teams national firewall martial law and retna databases make sure of that AND THAT IS WHY ONLINE "PRIVACY" IS A waste of time (PLEASE DONT end me govt I'm spreading truth of your great strength at surveillance not suggesting stuff 🤐☹) Comment from : @wyvernfallgaming |
|
I'm ready to scam Comment from : @randomname030 |
|
Holy shit the misinformation I feel so bad for people who actually believe in the stuff said in this video Comment from : @janski1476 |
|
About transferring trust to VPN; the same goes for cloud based password manager Comment from : @7o7-zoz97 |
Privacy u0026 Anonymity: Balancing Freedom and Accountability in Cryptocurrency РѕС‚ : Sucryptoz Download Full Episodes | The Most Watched videos of all time |
3 Best Bitcoin Mixers For Privacy And Anonymity РѕС‚ : Crypto Renegade Download Full Episodes | The Most Watched videos of all time |
The BEST Privacy Coins For Anonymity ? РѕС‚ : Coin Bureau Download Full Episodes | The Most Watched videos of all time |
Bao giờ có thể rút được kin về ví- achi kiếm tiền online РѕС‚ : Achi kiếm tiền online Download Full Episodes | The Most Watched videos of all time |
Your Ultimate Guide to Security | CCNP and CCIE Security Core SCOR 350-701 Crash Course - Day 1 РѕС‚ : Mastering Any Skill And Knowledge Download Full Episodes | The Most Watched videos of all time |
Your Ultimate Guide to Security | CCNP and CCIE Security Core SCOR 350-701 Crash Course - Day 2 РѕС‚ : Mastering Any Skill And Knowledge Download Full Episodes | The Most Watched videos of all time |
The uPlexa Network - Anonymity u0026 eCommerce via IoT (UPX) РѕС‚ : uPlexa Download Full Episodes | The Most Watched videos of all time |
Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security | Simplilearn РѕС‚ : Simplilearn Download Full Episodes | The Most Watched videos of all time |
What are Privacy Coins? | Privacy Coin Report РѕС‚ : Privacy Coin Report Download Full Episodes | The Most Watched videos of all time |
ZCOIN REVIEW NEXT BEST PRIVACY COIN BEAM REVIEW NEXT BEST PRIVACY COIN NANO COIN REVIEW WHY IT РѕС‚ : SINET ID Download Full Episodes | The Most Watched videos of all time |