REVEALED! Your Secret Power Over Google
Summary
TLDRThe video discusses the pervasive tracking by tech giants like Google and emphasizes the importance of understanding their mechanisms to overcome privacy challenges. The narrator, a deep-level technologist, explains that the key to privacy lies in evading attribution, preventing personal identity from being linked to online activities. Strategies to protect privacy include using different browsers and devices, and employing tools like VPNs and email services that obscure identity and traffic. The video also promotes the use of a dGoogle phone, a device without Google login, to significantly reduce tracking.
Takeaways
- 📚 The speaker reads and responds to comments, learning about viewers' concerns regarding online privacy and Google's tracking practices.
- 😨 The audience's common reaction to the previous video was shock and despair about Google's tracking, with some suggesting extreme measures like quitting the internet.
- 🛡️ The speaker aims to educate viewers on how to understand and overcome privacy challenges posed by tech giants like Google, rather than succumbing to fear or helplessness.
- 🤔 The speaker emphasizes the importance of knowing the threats to privacy in detail to effectively problem-solve and protect oneself online.
- 🔍 Google's business model relies on tracking users, and the speaker identifies 'Normie' behavior as being susceptible to such tracking (being 'zucked').
- 💡 The key to beating Google's tracking is understanding its foundation and exploiting its weaknesses, as the speaker, a deep-level technologist, explains.
- 🎯 The central concept is 'attribution' – the process of linking internet actions to a specific identity, which is the core of privacy concerns.
- 🔐 The speaker argues that data without identity attached has little value, and the goal should be to prevent Google from associating data with one's identity.
- 📱 The speaker discusses various scenarios involving different levels of exposure to Google tracking, from using Google services logged in to using non-Google devices and services.
- 🚫 The speaker advises against relying solely on Google's platforms and services, suggesting alternative methods and technologies to enhance privacy.
- 🛒 The speaker promotes his company's solutions for privacy, including a dGoogle phone, VPN services, and email services, as tools to mitigate tracking and protect identity.
Q & A
What was the common reaction to the speaker's last video on Google tracking?
-The common reaction was that most viewers felt mortified and some even suggested leaving the internet, stopping the use of smartphones, and social media due to a sense of hopelessness regarding privacy.
What is the speaker's stance on using Google and privacy challenges?
-The speaker acknowledges using Google but emphasizes that understanding the underlying mechanisms of how Google works allows us to overcome privacy challenges. The speaker believes in revealing these mechanisms to help users protect their privacy.
What does the speaker consider as the main threat to privacy?
-The speaker considers the Google ID as the main threat to privacy because it allows Google to collect and attribute data to a specific individual, enabling manipulation and potential privacy invasions.
What is the concept of 'attribution' in the context of the video?
-Attribution refers to the process of assigning an internet action to a real person's identity. It is a key concern for privacy as it links individual actions to a specific identity, allowing companies like Google to build profiles and potentially manipulate users.
How does the speaker suggest improving privacy online?
-The speaker suggests improving privacy by understanding and exploiting the weaknesses of Google's systems. This includes avoiding the association of online activities with one's Google ID and being mindful of the identity attached to the data collected.
What are the two primary methods of tracking mentioned in the video?
-The two primary methods of tracking mentioned are deterministic tracking, which involves attributing actions to a specific Google ID, and probabilistic tracking, which is based on guesses and short-term data that may or may not be linked to an identity.
What is the speaker's advice for dealing with probabilistic tracking?
-The speaker advises that probabilistic tracking can be less of a concern if it cannot be linked to a specific identity. They suggest feeding the system misleading information or engaging in activities that do not reveal one's true interests to disrupt profiling attempts.
How does the speaker describe the use of a Google phone in relation to privacy?
-The speaker describes a Google phone, especially one used for limited purposes like 2FA only, as a device that can be managed to minimize privacy risks. They recommend turning the device off most of the time and not using any apps on it to reduce the data available for collection.
What solutions does the speaker offer for enhancing privacy?
-The speaker offers solutions such as using a dGoogle phone (a phone without Google services), a VPN service to hide IP addresses, a secure email service to hide identity information, and the use of various browsers and devices to segment online activities and protect privacy.
Where can viewers find the speaker's products and services?
-Viewers can find the speaker's products and services on brax.me, where they offer a range of privacy-focused solutions including dGoogle phones, VPN services, and secure email services.
How does the speaker address the issue of manipulation through personal data collection?
-The speaker emphasizes that the goal is to prevent Google or other platforms from creating an accurate profile of who you are. By being smart about how you partition your online activities and ensuring that your identity is not easily attributable to your data, you can reduce the ability of these platforms to manipulate you.
Outlines
🧐 Understanding Google's Tracking and Privacy Concerns
The paragraph discusses the audience's reaction to a previous video on how Google tracks user activity. It highlights the common sentiment of concern and helplessness, with suggestions to abandon the internet and smartphones. The speaker clarifies that they use Google and other platforms but emphasizes the importance of understanding the mechanisms of tracking to overcome privacy challenges. The speaker, a deep-level technologist, asserts that by knowing Google's weaknesses, one can maintain privacy while using their services.
🔍 The Importance of Attribution in Privacy
This section delves into the concept of attribution, explaining its significance in privacy. It distinguishes between security and social media contexts, emphasizing the need to link internet actions to a specific identity for data to be valuable. The speaker argues that without identity attachment, Google's data collection is harmless. The crux of the privacy issue lies in Google linking actions to individual identities, which the speaker advises to avoid. The focus should be on preventing the association of data with one's identity.
🛡️ Strategies for Protecting Identity from Google
The speaker presents various scenarios to illustrate how Google tracks users based on their Google ID and other identifiers. It discusses deterministic and probabilistic tracking methods and suggests strategies to limit Google's ability to collect data attached to one's identity. Techniques include using different browsers for different activities, feeding Google incorrect information, and limiting activities on devices that can be tracked back to the user. The speaker also mentions using a special phone without Google services for enhanced privacy.
💡 Privacy Solutions and Resources
In the final paragraph, the speaker offers solutions to enhance privacy, including the use of a non-Google phone and VPN services. They promote their company's offerings, such as a dGoogle phone, VPN, and email service, designed to protect user privacy by eliminating tracking and preventing identity disclosure. The speaker encourages viewers to think strategically about their online activities and to use the knowledge shared to safeguard their privacy. They also inform about their live streams on alternative platforms and how to sign up without providing personal information.
Mindmap
Keywords
💡Privacy
💡Tracking
💡Normie
💡Attribution
💡Deep Level Technologist
💡Achilles Heel
💡Evading Attribution
💡Google ID
💡Data Identity
💡Probabilistic Tracking
💡Disinformation
Highlights
The common reaction to the last video on how Google tracks every click was that it mortified most viewers.
Many comments suggested leaving the internet, stopping smartphone use, and giving up on social media due to privacy concerns.
The speaker uses other platforms beyond YouTube and has around 140,000 followers on them.
Understanding the tech mechanisms used by Google is essential to overcome privacy challenges.
Google's model is based on tracking the 'normie' user, and deviating from this behavior can help protect privacy.
The speaker is a deep-level technologist and aims to teach the audience how to beat Google's technology.
The importance of understanding the real threats to privacy is emphasized over simple solutions.
Evading attribution is the key to privacy; without it, data has no value.
Google's infrastructure has an Achilles heel, which is its reliance on attributing data to specific identities.
The speaker is not afraid of Google tracking their activities, as they understand the nature of internet data collection.
Google's primary way of collecting information is through a logged-in Google ID.
Different tracking methods are explained, including deterministic and probabilistic tracking.
Scenarios are provided to understand how different actions affect privacy in relation to a Google ID.
Using a phone with a Google login allows Google to verify device identifiers and perform deterministic tracking.
The speaker recommends using a dGoogle phone, which has no Google login or hidden communications with Google.
A VPN service is offered to hide IP addresses and provide encryption against man-in-the-middle attacks.
The speaker's live streams have moved to Rumble and Rooster Ban Locals, airing on Thursdays at 8:00 p.m. Pacific Time.
Transcripts
as many of you regulars already know I
read all your comments and respond to
almost all of them if there's a question
and I learned a lot about what you're
all thinking just from these comments
this is what I learned from reading
these on the last video the common
reaction to my last video on how Google
Tracks every single click was just that
it mortified most of you and I saw so
many comments about just leave the
internet just stop using smartphones
stop using social media we're doomed and
so on I did get into potential Solutions
later on but maybe these people just
tuned out by then by all the perceived
negativity and hopelessness let's be
clear I obviously use Google I'm here on
YouTube though it is incorrect to say
I'm just tied to YouTube I have as of
right now around
140,000 followers on other platforms and
some of you are watching me on those
other platforms but I'm not afraid of
Google the purpose of these videos is to
reveal the tech mechanisms used so we
can overcome them if we can't overcome
these privacy challenges then I need to
pack up and give up but fortunately we
have
Solutions Google's model is based on
tracking the
Normie if you behave like a normie then
you will be zucked and things will be
pretty much hopeless for you privacy
wise but if you actually understand the
foundation of how Google works then you
can beat their technology I understand
this because I'm a deep level
technologist the reality is that we can
coexist with Google in this tracking
infested Tech if you know the weaknesses
of their systems in this video I will
teach you real limitations to what
Google can do and this can then be used
to our advantage to control what Google
knows about us stay right
[Music]
there one person said in a comments that
he has no time for long explanations
about the why of things just tell him
the
solution that's not my style folks I
have realized that I cannot teach you
properly unless I tell you what the
actual threats are to your privacy very
specifically may not be exciting for the
nonis but it's been the unique style of
this channel since day one and the
purpose of teaching you in detail is to
arm yourselves with the knowledge to
problem solve things
yourself there's so much disinformation
on this topic on the internet and I have
so many enemies likely techies who work
for the same tech companies or corporate
cyber security people with completely
different motives than I have in general
I find that some techies arrive at
incorrect Solutions because they didn't
truly understand the real threat let's
go back to Google specifically and tell
you what the Achilles heel is of the
infrastructure now don't just jump out
of this video after I explain what this
ailles heel is because it is not a
simple thing to overcome this it
requires some really careful thinking
and understanding of solutions that can
work the reality is that I'm personally
not afraid of my activities being
tracked by Google in fact I know that my
actions on the internet are constantly
collected and recorded it is a waste of
effort to close the internet barn doors
after the horses are already out the
fact of the matter is that on the
internet this is is pretty much
impossible since every action is
recorded by somebody whether it be
Google Facebook or a government but this
doesn't worry me I'm not spending
sleepless nights fretting over this in
fact you should all know that hackers
are very active all over the Internet
they don't worry much either they are
busy disrupting these corporate behs and
obviously their actions are being
tracked so this sounds all completely in
congruous right
I want you to learn something about
these hackers especially the state level
players who really know what they're
doing meaning government sponsored
hackers the name of the game is evading
attribution let me repeat that so it
sticks in your head
attribution a very important word it is
actually the Pinnacle of all my
Solutions on privacy again the task is
to evade attrib attribution attribution
in a hacking context is when the
security researchers look for signs and
patterns in an attack and determine that
the attacker is actually some specific
person or some specific government in a
social media context attribution really
means to assign some internet action to
a real person's identity okay I Chang
words on you I started off with some
vague word called attribution and now
I've introduced a new word which is I
identity and this is really what the
average person needs to concern himself
about I have to repeat this several
times for this to syn in everything you
do on the Internet is trct there is no
question about this this is how the
internet works just accept this but this
information about internet actions has
no value if the data cannot be
attributed to a specific identity in
other words the tracking party Google in
this case has to know who did the action
otherwise their computer systems don't
know where to file these pieces of
information I'll give you a specific
example if you go to the internet and
search for certain diseases and how
these can be treated Google knows that
and certainly he can give you account of
how many people searched about
pancreatic cancer or hypertension or
heart failure and so on but the danger
to privacy is when Google knows that Joe
searched for pancreatic cancer Leticia
searched for hypertension and Jerry
searched for heart failure without an
identity attached to the activity Google
cannot hurt you Google can affect Joe
letia and Jerry here because it'd knows
something very specific about them that
is the Crux of the Privacy problem don't
focus on the collection of data Focus
instead on the identity attached to that
data or at least think of it as a pair
data identity you can have data with no
Identity or identity with no data either
way it works I've tried to explain this
in many videos and I've had to restate
this in a different way every year now
from here it gets more complex We Now
understand that Google's Achilles heal
is that for data to be valuable there
must be some identity attached to it
many of you will leave the video now
because you figured it out you will come
up with some half big idea on how to
hide your identity from Google and
you're good to go but that is also the
problem Google is very smart about
finding your identity and so we have to
be equally Smart in overcoming that it's
not
simple this is why you need to pay
attention to the details this is also
constantly evolving a few years ago
Google was using different techniques
than it is using
today by the way I just want to make it
clear that each of you individually
isn't important to Google I'm not
important to Google this is why I'm not
afraid of Google Google has a global
view of the data landscape if they're
able to collect information about the
internet actions in 90% of the cases
using whatever techniques they have then
they're good to go as long as there are
enough
normies they have the ability to make
tons of money on that they can fund
their Google search Gmail Google Drive
YouTube with ads so it is a wasted
effort to view this as some personal
attack their computer systems will not
waste time on use specifically now the
government might if you're some targeted
individual but the reality is that
Google is bent on profiting from Normie
Behavior meaning they are there to take
advantage of the normi with nothing to
hide the rest of us they won't bother
and historically this has been the case
let's get specific now the primary way
Google collects information about
individuals is via your logged in Google
ID I specifically discussed it in my
last video as deterministic tracking
they can attribute all your actions on
the internet if they know your Google ID
please watch that video If you haven't
so far so you have the theoretical
framework to understand more of what I'm
saying here all other methods of
tracking such as IP address location Mac
address IMEI and so on which many of you
fear is called probabilistic tracking
this is tracking based on a guess of
attribution probabilistic is not exact
so its long-term value is uncertain but
if they can keep records of your
activities in the short term you will
likely make a mistake and Reveal Your
Google ID and then the the probabilistic
tracking becomes
deterministic meaning they can then
associate a whole slew of activities to
your real
identity but if they can't do that then
that probabilistic data just Fades away
it has no long-term value if it cannot
be filed away under the data of a
specific individual so given this
understanding if you're still with me
here the general guide to a solution to
privacy is to withhold the Google ID as
much as possible from Google I'm going
to give you VAR scenarios so you can
understand the concept here scenario
number one Chrome logged in you're on
Chrome logged into Google you use
YouTube Google search and Gmail scenario
number two Brave not logged in you're
brave and you're not logged into Google
you use YouTube and Google search you
cannot use Gmail since you're not logged
in scenario number three nor me phone
logged in you're on a standard phone and
the phone is logged into Google scenario
number four the Google phone no login
you're on a special phone called a the
phone here it is clear that Google's
watching you on all the Google platforms
you are using Google search Gmail
YouTube Google Drive and so on all your
actions are associated with your Google
ID think about this what if you never go
to a non-google site on this browser
well what happens is that there's no
tracking history accumulated for
non-google
sites also because you know someone is
watching you can feed the machine
information you want this is an advanced
Technique One want to search for
contrary content and you will have
Google classify you incorrectly this for
example could be opposite day with
regards to politics religion gender and
so on this AI is very vulnerable to this
next what if you limited your activity
on this browser to nonsense maybe this
is only for watching dog videos and
bathroom repair things of no importance
for profiling a
belief then expect that Google does not
know what you believe
in now here's a completely different
environment no Google ID so nothing you
do will ever be associated with your
identity you can watch anything search
for anything have any kind of opinion
while some tracking will occur it will
only be probabilistic tracking and short
term it will not be a long long-term
history you can improve your privacy
here by not using Google search but even
if you did the effect is not
permanent now this is the most dangerous
device actually because not only are you
logged in but the OS can actually verify
the device identifiers this is something
you need to understand and is one of the
newer techniques Google uses so phones
are a particularly difficult risk
because if you log in once then the IMEI
of the device is associated with your
Google ID and it doesn't matter if you
log out it is always a deterministic
tracking method but I mentioned this in
my other videos I actually have a
standard Google Android I use it for 2fa
only and it is off 99.9% of the time I
turn it on maybe four times a year what
does Google know about this particular
device then I don't use any apps on it
it is mostly off so here if I can't get
rid of the identity I solve it by
removing that data when not in use there
is no data to
capture now this is a special case based
on technical details I explained in
other videos a phone running Android
open- source project or aosb has no
Google code in it at all this phone does
not log in to Google ever and there is
no Google ID nor any software that talks
to Google in the background this is
basically like the case of Brave browser
in scenario number two you can do
anything you want since it will never be
associated with your Google ID it is
basically untrackable to Google Google
also cannot see the IMI and other
identifiers there are technical
explanations to why this is the case
Google can perform short-term tracking
using probabilistic methods but no
long-term way to keep that data and
assign it to an identity now each of
these scenarios has little gotas and
some Advanced complications but again
the most important thing is if there is
any way to record your activity for the
long term you can be in all these four
scenarios simultaneously as long as you
know you're being watched in scenario
number one and scenario number three is
that a problem it depends on what you're
doing in these
scenarios a smart privacy oriented
person will use this knowledge to
partition what they do the main threat
is not to have a Google or other Big T
platform get a profile on who you are
exactly using a planned collection of
devices and browsers you can Define what
is known about you the less they know
about what you're thinking the less
they're able to manipulate you by
changing your search content or B
basically changing your internet in the
end it's all about influencing you
either to get you to buy stuff or to
make you believe certain things which
may or may not be
true if you're smart you start thinking
about how to confuse the
machine when the machine is confused it
cannot act against you don't worry about
fine details look at the big picture
forget that you're being tracked
everywhere just always be aware if they
know who you really are now my many
videos will go into many details about
many other little things but basically
understanding what I say here is perhaps
80% off the battle if you want something
for me to focus on just let me know in
the comments thank
you there are privacy Solutions and
that's why I started a company to help
the average person to do this more
easily
as I said in the video the main threat
is the Google ID which is on the phone
and the solution to that is to have a d
Google phone which is a phone without a
login it is also a phone that has no
hidden Communications with Google that
can reveal device identifiers or
locations this can knock out a
significant portion of the tracking we
sell various models of the Google phones
in our store
these phones are around
$400 so they are cheaper than normal
phones we have the btes VPN service
which I started a few years ago the
purpose of a VPN service is to hide your
IP address secondarily it provides
encryption to hide your traffic from
anyone listening this protects against
man-in-the-middle attacks especially
caused by governments and corporations
RV PPN service has worldwide coverage
and is provided by an entity known to
you me hopefully someone you can trust
we have a bmail service that hides
identity information from your email and
prevents you from showing up on contact
list it also eliminates IP addresses
from showing up in the header or in logs
we offer unlimited aliases seven domains
and a web mail check that out for $50 a
year all these are on my store on
brax.me sign up on there and you will
not be asked for any personal
information to sign up like email I also
want to remind you that I've moved my
live streams to rumble and Rob
ban. locals.com these live streams are
on Thursdays 8:00 p.m. Pacific Time join
me there if you want to ask questions
live thank you for watching and I'll see
you again next
time
Weitere verwandte Videos ansehen
5.0 / 5 (0 votes)