How To Become Invisible Online

Hallden
7 May 202124:05

Summary

TLDRDieses Video bietet umfassende Informationen, um im Internet unsichtbar zu werden. Es erklärt die notwendigen Tools und deren Funktionen, stellt drei Anonymitätslevel vor und zeigt, wie man sie implementieren kann. Es deckt alles von starken Passwörtern und mehrstufiger Authentifizierung bis hin zur Nutzung des Tor-Browsers und verschlüsselter Kommunikationstools ab. Lernen Sie, wie Sie Ihre Online-Spuren minimieren und Ihre Privatsphäre schützen, ohne auf Bequemlichkeit zu verzichten.

Takeaways

  • 😎 Anonymität im Internet kann in drei Stufen erreicht werden: Schwierig zu hacken, schwer zu verfolgen und vollkommen unsichtbar.
  • 🔒 Die erste Stufe der Anonymität, 'schwierig zu hacken', beinhaltet das Erstellen starker Passwörter, das Zurückhalten persönlicher Informationen und das Erstellen mehrerer E-Mail-Adressen.
  • 🔑 Starkes Passwort: Verwenden Sie 25 Zeichen oder mehr und erstellen Sie ein sich erinnernbares Passwort durch die Verwendung von Sätzen oder Liedtexten, die Sie umwandeln können.
  • 📬 Mehrere E-Mail-Adressen: Unterteilen Sie Ihre E-Mail-Kommunikation in verschiedene Bereiche des Lebens, um Ihre Online-Sicherheit und -Privatsphäre zu erhöhen.
  • 🌐 Verwenden Sie den Tor-Browser, um Ihre IP-Adresse zu maskieren und so Ihre Online-Aktivitäten vor Trackern zu schützen.
  • 🔗 VPNs können helfen, Ihre tatsächliche IP-Adresse vor Websites zu verbergen, bieten jedoch keine vollständige Anonymität.
  • 🗝️ Passwort-Manager wie Dashlane oder open-source Lösungen wie KeePass können Ihnen helfen, starke Passwörter zu erstellen und zu verwalten.
  • 📱 Verwenden Sie verschlüsselte Messaging-Apps wie Signal oder Chat Secure, um Ihre Kommunikation vor Überwachung zu schützen.
  • 🎯 Um vollkommen unsichtbar zu sein, müssen Sie auch andere Faktoren berücksichtigen, die Ihre Identität preisgeben könnten, wie Geräteinformationen, Betriebssystem oder Internetverbindung.
  • 🛡️ Um die 'Exit-Node-Problematik' von Tor zu umgehen, können Sie einen eigenen Proxy erstellen oder als Proxy fungieren, um Ihre tatsächliche IP-Adresse zu verbergen.
  • 🌐 Um völlig unsichtbar zu sein, könnten Sie ein vorbereitetes Smartphone oder Modem mit Vorauszahlung verwenden, um sich über öffentliches WLAN zu verbinden, während Sie sich vor Überwachungskameras schützen.
  • 🚫 Wichtig ist, dass Sie keine persönlichen Informationen preisgeben, die Sie mit Ihrer Identität in Verbindung bringen könnten, um eine vollständige Anonymität zu erreichen.

Q & A

  • Was ist das Hauptziel des Videos?

    -Das Hauptziel des Videos ist, den Zuschauern alles zu erklären, was sie brauchen, um sich online unsichtbar zu machen, einschließlich der benötigten Tools und der drei Stufen der Anonymität.

  • Was bedeutet es, 'vollständig unsichtbar' zu sein?

    -Vollständig unsichtbar zu sein bedeutet, dass man keine Spuren im Internet hinterlässt und für niemanden nachverfolgbar ist, was in der Regel nur erforderlich ist, wenn eine Regierungsbehörde einen aktiv sucht.

  • Wie viele Stufen der Anonymität gibt es und was ist der Unterschied zwischen ihnen?

    -Es gibt drei Stufen der Anonymität: Schwierig zu hacken, schwierig zu verfolgen und vollständig unsichtbar. Jede Stufe erhöht die Anonymität und Sicherheit, verlangt jedoch auch mehr Anstrengung und Aufwand.

  • Was sind die drei Schritte, um 'schwierig zu hacken' zu werden?

    -Die drei Schritte sind: Starke Passwörter erstellen, minimale persönliche Informationen preiszugeben und mehrere E-Mail-Adressen zu verwenden.

  • Warum sollten lange Passwörter verwendet werden?

    -Lange Passwörter sind stärker, weil sie schwerer zu knacken sind, da moderne Computer kürzeren Passwörtern gegenüber schneller brechen können.

  • Was ist ein sichereres Verfahren, um Passwörter zu speichern, als sie in der Notes-App zu notieren?

    -Ein sichereres Verfahren ist der Einsatz eines Passwortmanagers, der nicht nur zufälligere Passwörter erstellen kann, sondern sie auch sicher speichern kann.

  • Was ist der TOR-Browser und wie hilft er dabei, anonym im Internet zu surfen?

    -Der TOR-Browser ist ein Tool, das Ihre IP-Adresse randomisiert und End-to-End-Verschlüsselung verwendet, um Ihre Identität vor Websites zu verbergen und Ihre Surfaktivitäten zu verschlüsseln.

  • Was sind einige der Faktoren, die verwendet werden können, um einen Benutzer im Internet zu identifizieren?

    -Faktoren wie IP-Adresse, Gerät, Betriebssystem, Wi-Fi-Verbindung, Internetdienstanbieter, Bildschirmgröße und -auflösung können verwendet werden, um einen Benutzer zu identifizieren.

  • Was ist das 'Exit-Node-Problem' im Zusammenhang mit TOR und wie kann es behoben werden?

    -Das Exit-Node-Problem bezieht sich auf das letzte Router-Element im TOR-Netzwerk, das Anfragen in Klartext sendet. Um dieses Problem zu beheben, kann man entweder einen eigenen Proxy erstellen oder einen Proxy verwenden, an dem man nicht persönlich ist.

  • Was sind einige der Maßnahmen, die ergriffen werden können, um eine vollständige Unsichtbarkeit zu erreichen?

    -Um vollständig unsichtbar zu sein, kann man Maßnahmen wie den Einsatz eines Proxys, die Verwendung von VPNs, das Bedecken des Gesichts vor Überwachungskameras, das Kaufen von Burner-Telefonen oder 4G-Internet-Modems mit Bargeld und das Verwenden von öffentlichem WLAN ergreifen.

  • Welche Ressourcen werden am Ende des Videos empfohlen, um mehr über Anonymität im Internet zu lernen?

    -Am Ende des Videos werden Ressourcen wie 'The Art of Invisibility' von Kevin Mitnick und Links zu den erwähnten Tools und Methoden empfohlen.

Outlines

00:00

🕵️‍♂️ Anonymität im Internet - Grundlagen

Dieses Video gibt einen Überblick über die notwendigen Schritte, um sich online anonym zu verhalten. Es erklärt, welche Tools verwendet werden und welche Ebenen der Anonymität es gibt. Es wird betont, dass vollständige Unsichtbarkeit fast niemandem nötig ist, außer in Fällen, wo eine Regierungsbehörde einen aktiv verfolgt. Das Hauptziel ist es, möglichst keine Spuren zurückzulassen und diese so zu verstreuen, dass eine Rückverfolgung zu Schwierigkeiten führt. Zudem wird aufgeklärt, dass viele Unternehmen nur dann Daten sammeln können, wenn wir es ihnen erlauben, indem wir Informationen freiwillig preisgeben.

05:01

🔒 Schritte zur Erreichung der Stufe 1 der Anonymität

Der erste Schritt zur Anonymität besteht darin, starke Passwörter zu erstellen, die 25 Zeichen oder mehr umfassen sollten. Um diese zu erinnern, wird empfohlen, einen Satz oder ein Lied zu verwenden und nach eigenem Regelwerk zu modifizieren. Außerdem sollte man persönliche Informationen nur im Minimum preisgeben und mehrere E-Mail-Adressen verwenden, um verschiedene Aspekte des Lebens zu trennen und die Sicherheit zu erhöhen. Es wird auch auf die Verwendung von Passwort-Managern hingewiesen, die sowohl beim Erstellen als auch beim Speichern von Passwörtern helfen.

10:02

🌐 Verwendung des Tor-Browsers für Stufe 2 der Anonymität

Um schwer nachverfolgbar zu sein, wird empfohlen, den Tor-Browser zu verwenden, der die IP-Adresse verschleiert und End-to-End-Verschlüsselung anwendet. Tor nutzt sogenannte Onion-Routing, bei dem die Daten mehrfach verschlüsselt werden, um eine Rückverfolgung zu erschweren. Zusätzlich wird auf die Verwendung verschlüsselter Messaging-Apps wie Chat Secure und Signal hingewiesen, die ebenfalls zur Anonymität beitragen.

15:03

🚀 Stufe 3 der Anonymität: Komplett Unsichtbar

Um vollständig unsichtbar zu sein, müssen nicht nur die IP-Adresse und die Aktivitäten geschützt werden, sondern auch der verwendete Gerätetyp, das Betriebssystem, die Internetverbindung und andere Merkmale, die zur Identifizierung beitragen können. Hierzu gehört die Verwendung von Proxies oder eigener Exit-Node-Sicherung, um das Risiko durch Exit-Nodes im Tor-Netzwerk zu minimieren. Es wird auch auf die Verwendung von VPNs und die Bedeutung von Open-Source-Tools wie KeePass für den Passwort-Manager hinzugefügt.

20:04

🎭 Letzte Schritte zur absoluten Anonymität

Für absolute Anonymität werden drastischere Maßnahmen empfohlen, darunter das Kaufen von Laptops und Handys mit Bargeld, um sie nicht zurückverfolgbar zu machen, und das ausschließliche Nutzen dieser Geräte in öffentlichen Orten, um eine Verbindung zum tatsächlichen Standort zu verhindern. Auch die Nutzung von Burner-Telefonen und die Beachtung von Maßnahmen zur Vermeidung von Überwachungskameras werden als Teil der Strategie zur Erreichung von Anonymität beschrieben. Es wird betont, dass diese Maßnahmen viel Anstrengung erfordern und nur in Ausnahmefällen notwendig sind.

Mindmap

Keywords

💡Anonymität

Anonymität bezieht sich auf den Zustand, in dem eine Person keiner Identifizierung unterliegt. Im Video ist Anonymität das zentrale Thema, da es erklärt, wie man sich im Internet unsichtbar macht. Ein Beispiel ist die Nutzung von Tools wie Tor, um die eigene IP-Adresse zu verbergen und so die Identität zu schützen.

💡Tor-Browser

Der Tor-Browser ist ein spezielles Browser-Programm, das verschlüsselte Verbindungen nutzt, um die Anonymität des Benutzers im Internet zu gewährleisten. Im Video wird er als Mittel eingesetzt, um die IP-Adresse zu maskieren und so das Überwachen der Online-Aktivitäten zu verhindern.

💡IP-Adresse

Die IP-Adresse ist eine eindeutige Nummer, die jedem Internet-Gerät zugewiesen wird und es ermöglicht, Datenübertragungen zu vermitteln. Im Video wird betont, dass die Maskierung der IP-Adresse ein entscheidender Schritt ist, um anonym im Internet zu surfen und so die Identität vor Trackern zu schützen.

💡Passwort-Manager

Ein Passwort-Manager ist ein Tool, das dazu dient, Passwörter sicher zu speichern und zu verwalten. Im Video wird empfohlen, ein Passwort-Manager zu verwenden, um komplexe Passwörter zu erstellen und zu verwalten, um Accounts besser vor Hacks zu schützen.

💡Verschlüsselung

Verschlüsselung ist der Prozess, bei dem Informationen in eine Form umgewandelt werden, die nur von autorisierten Personen gelesen werden kann. Im Video wird die End-to-End-Verschlüsselung von Tor und verschlüsselte Messaging-Apps als Mittel zur Sicherung der Kommunikation und Daten vor unbefugtem Zugriff beschrieben.

💡VPN (Virtual Private Network)

Eine VPN ist ein Netzwerk, das eine sichere, verschlüsselte Verbindung zwischen dem Benutzer und dem Internet bietet. Im Video wird erläutert, dass VPNs zwar helfen können, die eigene IP-Adresse zu verbergen, aber nicht ausreichend sind, um vollständig unsichtbar zu werden.

💡Exit-Node

Der Begriff 'Exit-Node' bezieht sich im Zusammenhang mit Tor auf den letzten Knoten, der die verschlüsselte Anfrage entschlüsselt, bevor sie zum Ziel-Website gesendet wird. Im Video wird die Exit-Node als potenzielles Risiko für die Anonymität des Benutzers beschrieben, da sie möglicherweise Rückschlüsse auf die Herkunft der Anfrage zulassen könnte.

💡Proxy

Ein Proxy ist ein Server oder eine Anwendung, die als Zwischenstufe zwischen dem Benutzer und dem Internet dient. Im Video wird die Nutzung eines Proxies oder das Einrichten eines eigenen Proxies als Methode beschrieben, um die Anonymität bei der Nutzung des Tor-Browsers weiter zu erhöhen.

💡End-to-End-Verschlüsselung

End-to-End-Verschlüsselung bedeutet, dass die Kommunikation zwischen dem Absender und dem Empfänger verschlüsselt ist, sodass niemand, der die Daten überwacht, die Inhalte lesen kann. Im Video wird dies als wichtige Eigenschaft von verschlüsselten Messaging-Apps und E-Mail-Diensten hervorgehoben.

💡Datenschutz

Datenschutz bezieht sich auf die Maßnahmen und Vorsichtsmassnahmen, die ergriffen werden, um persönliche Informationen vor unbefugtem Zugriff, Offenlegung oder Missbrauch zu schützen. Im Video wird die Wichtigkeit des Datenschutzes betont, indem verschiedene Tools und Methoden vorgestellt werden, die dazu beitragen, den Online-Datenschutz zu erhöhen.

💡Kryptografie

Kryptografie ist die Wissenschaft von Verschlüsselungsmethoden und -systemen, die zum Schutz von Informationen verwendet werden. Im Video wird erwähnt, wie Benutzer eigene Verschlüsselungsregeln erstellen können, um Passwörter zu generieren, die schwer zu knacken sind.

Highlights

Erklärung der drei Stufen der Anonymität online, um ein Verständnis für die gewünschte Anonymitätsstufe zu erhalten.

Die meisten Menschen benötigen nur eine einfache Anonymität, die nicht komplett unsichtbar ist.

Voller Unsichtbarkeit ist nur notwendig, wenn eine Regierungsbehörde aktiv nach jemandem sucht.

Online-Versteckspiel beinhaltet das Verlassen der geringsten möglichen Spuren und deren Verbreitung, um die Identifizierung zu erschweren.

Google, Facebook und andere Unternehmen verfolgen, was man ihnen erlaubt und oft freiwillig gibt.

Erster Schritt zur Online-Unsichtbarkeit: Aufhören, persönliche Informationen preiszugeben.

Schritt-für-Schritt-Anleitung zur Erstellung starker Passwörter und Erinnerung durch selbst erstellte Regeln.

Verwendung von Passwort-Managern zur sicheren Passwort-Erstellung und -Speicherung.

Weg zur Erhöhung der Sicherheit: Weniger persönliche Details preiszugeben und alternative Adressen zu verwenden.

Erstellung mehrerer E-Mail-Adressen für verschiedene Lebensbereiche zur erhöhten Sicherheit und Privatsphäre.

Verwendung des Tor-Webbrowsers zur Anonymisierung der IP-Adresse und zum Verhindern der Identifizierung.

Erklärung des End-to-End-Verschlüsselungsverfahrens von Tor und des sogenannten Onion-Routing.

Nutzung verschlüsselter Nachrichten-Apps wie Chat Secure, Signal und WhatsApp für匿名通信.

Einsatz von ProtonMail und Mailvelope zur Verschlüsselung von E-Mails.

Schritt-für-Schritt-Anleitung zur vollen Unsichtbarkeit durch Behebung von Schwachstellen im Tor-Browser.

Verwendung von Proxies oder eigener Proxy-Server-Erstellung zur Verhinderung der Exit-Node-Problematik.

Empfohlenes Vorgehen zur Erreichung von Anonymität: Vermeidung von illegalen Aktivitäten und Einhaltung von Stufe 2 Anonymität.

Transcripts

play00:00

[Music]

play00:14

alright so

play00:15

in this video i'm gonna show you

play00:17

everything you need to know to become

play00:18

truly

play00:19

invisible online i'll explain which

play00:22

tools you need and what they do

play00:23

i'm gonna show you the three levels of

play00:25

anonymity so that you get an idea of

play00:27

where you wanna place yourself

play00:29

and i think that pretty much everyone

play00:30

should at least start to implement

play00:32

level one anonymity and by the end of

play00:35

this video you'll have a good

play00:36

understanding of what it actually takes

play00:38

to browse the web anonymously

play00:40

so uh let's get started all right so

play00:42

i've put timestamps in the description

play00:44

in case you want to jump around to a

play00:45

specific section that is of most

play00:47

interest to you

play00:48

but as always i recommend watching it in

play00:51

the intended order since i put the video

play00:53

together in that way for a reason so to

play00:55

start off

play00:55

uh the kind of anonymity that most

play00:57

people are looking for

play00:59

is actually sort of easy to get but it

play01:02

won't be completely invisible

play01:04

however being completely invisible is

play01:06

something that is fairly useless to most

play01:09

of us and is not actually what we're

play01:10

looking for

play01:12

the only reason that you would actually

play01:13

need to be completely invisible

play01:16

is if some sort of like government

play01:18

agency pretty much

play01:19

is trying to track you down like

play01:21

actively looking for you

play01:23

so i will still explain how to become

play01:26

truly invisible but i just wanted to add

play01:30

this in here so that you know that

play01:31

for most of us there's no point in going

play01:34

through

play01:34

that much effort which is what it takes

play01:37

to actually become truly invisible if

play01:38

you just want to hide then that's

play01:40

actually pretty easy to do because

play01:42

hiding online essentially just comes

play01:44

down to trying to leave as few tracks

play01:46

behind as possible

play01:48

and also scattering those tracks as far

play01:51

apart as possible so that it becomes

play01:52

really difficult to actually track down

play01:55

who you are or where you're at i think

play01:57

that there's a major misconception when

play01:59

it comes to what most people think that

play02:01

google and facebook and all of these

play02:03

companies do when it comes to tracking

play02:05

us

play02:06

they track what you allow them to track

play02:08

and the most part of that

play02:10

are things that you actually give to

play02:12

them freely

play02:14

you store your photos on google cloud

play02:16

you send imessages you create profiles

play02:18

with your name and add your friends on

play02:20

facebook

play02:20

bookmark websites on chrome follow the

play02:23

people and products that you like on

play02:24

instagram

play02:25

give out your home address to amazon

play02:30

most of the things that are being

play02:31

tracked about us are actually things

play02:33

that we've given out freely

play02:34

and consciously there are sometimes

play02:36

things that we give out without knowing

play02:39

because we didn't read the long ass form

play02:41

before hitting accept

play02:42

but most of it would give out

play02:43

consciously and even if we're not

play02:45

consciously aware or we didn't think of

play02:47

the fact that this can later on be used

play02:49

to track us

play02:50

so therefore the first step to becoming

play02:52

invisible online is to stop handing out

play02:54

these flyers of personal information

play02:57

stop giving them things that can be used

play02:59

to track you so now let's get into the

play03:00

three levels of anonymity online and

play03:03

let's start with the level that i think

play03:05

everyone should start implementing level

play03:06

one becoming hard to hack

play03:09

becoming hard to hack is what i consider

play03:11

the base step that i think everyone

play03:13

should take

play03:14

so here are the three steps to becoming

play03:15

harder to hack and don't worry because

play03:17

i'll go through each of them

play03:19

in detail number one create strong

play03:21

passwords

play03:22

number two always give out minimum

play03:24

personal information to the sites that

play03:26

you visit

play03:27

number three create multiple emails okay

play03:30

so let's start with number one

play03:32

creating strong passwords so a long

play03:34

password is a strong password so

play03:36

i would suggest using something like 25

play03:38

characters or more for every password

play03:41

and i know that this is a lot for most

play03:43

people

play03:44

but computers today have become a lot

play03:46

faster and that means that shorter

play03:48

passwords are way easier to crack

play03:50

so the best way to protect against that

play03:52

is to create long

play03:53

and complex passwords the problem with

play03:56

long

play03:56

and complex is that most of us humans

play03:59

really struggle

play04:00

with remembering like a really long

play04:01

sequence of randomized

play04:03

letters and numbers and symbols and so

play04:07

the way that we solve that is to

play04:08

essentially come up with something that

play04:10

we can remember

play04:11

and that would be something like a

play04:13

sentence that you remember really well

play04:15

or that you know really well

play04:16

or a phrase of some kind or just a song

play04:19

lyric for instance that's something that

play04:21

a lot of people use

play04:22

and then what you do is you create a

play04:25

rule set of some kind that you make up

play04:27

for yourself

play04:28

and that rule set you use to change this

play04:31

phrase in some sort of way

play04:32

a super common one that you should

play04:34

absolutely not use

play04:35

is to replace specific letters with

play04:37

numbers that look like the letters

play04:40

so 4 means a 3 means e

play04:43

7 means t etc this is good but everyone

play04:46

pretty much knows this thing so

play04:48

don't use that but what you should do is

play04:50

you should do something similar but

play04:52

create a rule that's

play04:53

a lot more random than that one maybe

play04:55

replace every i with the percentage

play04:57

symbol

play04:58

so you start off by writing down a song

play05:01

lyric or a sentence of some kind

play05:03

that is easy for you to remember then

play05:05

you start replacing

play05:06

letters for symbols maybe even

play05:08

combinations of symbols

play05:10

so an a might actually turn into a

play05:13

an and sign and a curly brace and an

play05:16

equal sign now not only does that add a

play05:18

couple extra characters to your password

play05:20

but it also adds a ton of complexity

play05:23

while at the same time being easy for

play05:25

you to remember

play05:26

and this or what you would be doing here

play05:28

is actually a form of encryption

play05:30

you're constructing your own rules for

play05:32

an encryption algorithm because

play05:34

that's pretty much all that an

play05:35

encryption algorithm does

play05:37

it takes some sort of input and then it

play05:39

does certain things to that input

play05:41

based on certain rules and out comes

play05:44

gibberish

play05:44

this is an oversimplified version of

play05:46

that however it is a great way to create

play05:48

your own passwords

play05:50

but make sure that you write down your

play05:52

rules somewhere so now we have a strong

play05:54

password but we need to be able to store

play05:55

this somewhere

play05:56

most of us will use a note on our phone

play05:58

or add in new contacts for each password

play06:01

which is not very safe but i know that

play06:03

most of you guys will still continue

play06:05

doing

play06:06

this so here's a way to do that and make

play06:08

it a little bit more secure

play06:10

if you use the system for creating a

play06:11

password that i outlined before where

play06:13

you basically replace

play06:15

certain characters of the password for

play06:16

different things

play06:18

then what you could do is you could

play06:19

actually store the password

play06:21

as it is before you actually change

play06:23

those things that way even if someone

play06:25

finds your list of passwords they're

play06:27

unlikely to get into your accounts

play06:29

but you can make it even safer than that

play06:31

you can actually create rules

play06:32

for storing your passwords as well let's

play06:34

say that when you write down a password

play06:36

in your notes you always divide the

play06:38

numbers in that password by two

play06:40

or if you use a song lyric or sentence

play06:42

that you like

play06:44

then you may not need to store the

play06:45

entire sentence if your password is

play06:47

based

play06:48

on the song it's the final countdown

play06:50

then maybe you don't need to store

play06:52

the entire sentence you might only need

play06:54

to store it's

play06:55

the final or countdown or if it's i like

play06:58

big butts and i cannot lie

play07:00

you might only need to write down i like

play07:02

bots but do keep in mind that if your

play07:04

password is based on a really famous

play07:06

song then

play07:07

that actually makes it a little bit

play07:08

easier for a hacker to actually crack

play07:10

your password

play07:11

because the way that a hacker cracks a

play07:13

password is by utilizing something

play07:15

called word lists

play07:16

these are lists with thousands if not

play07:18

millions of the most common passwords

play07:20

so the program basically runs through

play07:22

all the words or passwords in that list

play07:25

and combines them in different ways to

play07:26

speed up the password cracking

play07:28

and i believe that common song lyrics

play07:30

are often in these sort of lists

play07:31

the better way to do all of this is

play07:33

actually to use a password manager

play07:35

because a password manager will take

play07:37

care of not only creating

play07:39

a lot more random passwords but it will

play07:42

also take care of remembering

play07:44

those passwords for you as well or

play07:45

storing them for most people i would

play07:47

recommend using something like dashlane

play07:50

and they're not paying me to say this

play07:51

even though they probably should

play07:53

so i can also say that dashlane is not

play07:55

foolproof but

play07:57

it is what most people actually are

play07:58

looking for and there are also other

play08:01

ones out there like lastpass

play08:02

and lots of other things but i haven't

play08:04

used any of them so i can't really

play08:06

recommend them

play08:07

if you want something a little bit more

play08:08

secure than that then you can find an

play08:10

open source password manager like

play08:12

keepass for instance

play08:13

the benefit with open source can be that

play08:15

lots of people can see how keepass was

play08:18

built

play08:18

so hopefully that means that potential

play08:20

bugs get fixed compared to something

play08:22

like dashlane where we can't actually

play08:24

see how it was built and

play08:26

so there could be some sort of

play08:27

vulnerability within their system that

play08:29

just hasn't been detected yet

play08:31

the ultimate would be to build your own

play08:33

password manager and store that on a usb

play08:35

stick that way it's very unlikely that

play08:38

someone else will find your passwords

play08:40

and even if they do find that usb stick

play08:42

they still need to get

play08:44

into your password manager which you've

play08:46

hopefully made really difficult

play08:47

but also that means that you need to

play08:49

plug in that usb stick anytime you need

play08:51

to log in somewhere and this is kind of

play08:53

the theme for this whole video

play08:54

it's that you usually end up trading

play08:57

convenience for security and anonymity

play09:00

and usually the more secure and

play09:02

anonymous something is the more

play09:04

effort it takes to actually use it so

play09:06

that's all you need to know about

play09:07

creating and storing really secure

play09:09

passwords

play09:10

so now let's move on to the next step of

play09:12

level one anonymity which is to stop

play09:14

giving out personal details to everyone

play09:17

if you buy something online then you may

play09:18

not actually need to enter in

play09:20

all the details accurately for instance

play09:23

my

play09:23

favorite life hack here is to actually

play09:26

enter in your

play09:27

local postal pickup point as your home

play09:30

address

play09:31

so anytime you buy something online then

play09:33

just enter in their address into the

play09:34

address field

play09:36

your thing will get shipped to them and

play09:37

the company you bought it from

play09:39

doesn't have your home address the other

play09:41

part to this is to just keep in mind

play09:42

that

play09:43

everything that you enter into any form

play09:45

online

play09:46

can be used to like identify or track

play09:49

you when you create passwords for

play09:50

certain accounts sometimes they ask you

play09:52

to answer

play09:53

some security questions in case you ever

play09:55

need to reset your password if they do

play09:57

that then you don't need to answer those

play09:59

questions

play09:59

accurately you can actually make it up

play10:01

as long as you remember the answers

play10:03

if they ask where you were born you can

play10:05

answer jupiter as long as you remember

play10:07

the answer it will work

play10:10

so this step also ties into the next

play10:12

step of level 1 anonymity

play10:14

which is to create multiple email

play10:16

addresses and this is something that

play10:18

may not feel like it would be something

play10:20

that you want to do

play10:22

but i highly recommend doing it the way

play10:24

you would do it is that you can create

play10:25

emails for different parts of your life

play10:27

maybe one for shopping one for business

play10:29

or work

play10:30

one for social media and one for

play10:32

personal stuff like friends and family

play10:34

this both increases your online security

play10:36

and your privacy

play10:37

if one of these emails gets hacked then

play10:39

all your stuff doesn't get hacked

play10:41

in hacking or cyber security they often

play10:44

talk about

play10:44

single points of failure and that you

play10:47

want to avoid that

play10:48

you want to avoid having one single

play10:50

email address that is connected to

play10:52

everything

play10:53

because if you do then someone who hacks

play10:54

that email has

play10:56

access to everything this may seem a

play10:58

little bit extreme or a bit too much

play11:00

effort but it doesn't need to be that

play11:01

much

play11:02

you can create super simple names like

play11:04

jonsnowshopping

play11:05

gmail.com that could be your shopping

play11:08

email and then you can do the same thing

play11:09

for everything else as well

play11:11

and that actually makes things a little

play11:13

bit more organized too

play11:14

if you ever need to find an email from

play11:16

that purchase that you made a couple

play11:17

months back

play11:18

then you don't need to search through

play11:20

all of your emails from that time period

play11:22

but you only need to search through the

play11:24

account related to shopping

play11:25

i highly recommend doing this and it

play11:28

also means that you'll get

play11:29

less spam for your personal email all

play11:32

right so when it comes to learning these

play11:33

sort of things that i do

play11:35

for making these sort of videos

play11:37

basically the first step will be

play11:39

researching and just learning how these

play11:41

things actually work

play11:42

and a great resource for this is today's

play11:45

video sponsor which is skillshare

play11:46

skillshare is an online learning

play11:48

community with well over 25 000

play11:50

different classes

play11:51

it's really affordable at only 10 a

play11:54

month for an annual subscription and the

play11:56

first

play11:56

1000 people that click the link in my

play11:58

description will get a free trial of

play12:00

skillshare premium

play12:01

and skillshare is really a super

play12:03

valuable resource for me

play12:05

most of what i do is learn how things

play12:07

work and then deliver that knowledge to

play12:09

you guys in

play12:10

videos like this one and skillshare is

play12:12

something that i actually pay for and

play12:13

that i was using before they ever

play12:15

contacted me

play12:16

and one of my favorite recent classes

play12:18

that i've been watching

play12:19

is mkbhd's course on how he makes his

play12:22

videos with tons of useful tips and

play12:24

tricks

play12:25

so that class is a hot tip from me they

play12:27

also have tons of classes on programming

play12:30

and even pretty much any topic that you

play12:32

can think of

play12:33

so you can literally pick and choose

play12:34

from thousands of classes

play12:36

it's a great place to start and again

play12:38

the first 1000 people to use the link in

play12:40

my description will receive a free trial

play12:43

of skillshare premium

play12:44

so sign up for it i mean you can try it

play12:46

for free so why not

play12:50

okay so that's level one become hard to

play12:53

hack

play12:54

now let's get to the next level level

play12:57

two

play12:57

become hard to track however the first

play13:00

part to this is not difficult

play13:02

and this is also what will give you the

play13:04

anonymity that most people are actually

play13:06

looking for this is to use the tor web

play13:08

browser to understand why tor

play13:10

is better than chrome for browsing the

play13:12

web anonymously

play13:13

we first need to understand what can be

play13:15

used to identify you on the web now this

play13:17

could be an entire book so i'm just

play13:19

going to explain what i think are the

play13:20

most important points that you need to

play13:22

understand

play13:22

so first off there's lots of things that

play13:24

can be used on the web to identify

play13:26

who you are or where you are and the

play13:28

main one being your ip address

play13:30

which is very accurately named because

play13:33

your ip

play13:34

address is a unique address that is

play13:36

associated with your device on the web

play13:39

okay so you may not think that there's

play13:40

much correlation between a postal office

play13:43

and the web

play13:44

but the web actually operates a lot like

play13:46

a postal office

play13:47

if you want to watch a youtube video

play13:49

then youtube needs to send that video to

play13:51

you

play13:51

so youtube needs some way of knowing

play13:53

where to send it

play13:55

so you need to have some sort of address

play13:56

that is unique to you so that the video

play13:58

will get to the right place

play14:00

same as a letter in the mail but if you

play14:03

don't want the postal office to know

play14:05

your address then you can give them an

play14:06

address of someone else that you know

play14:09

or the address to a postal box somewhere

play14:11

that you have access to

play14:12

meaning you basically hide your address

play14:14

which is what you want to do if you want

play14:16

to browse the web anonymously you want

play14:17

to hide your ip address

play14:19

you may have heard of vpns and they

play14:21

basically do what i explained that you

play14:23

could do

play14:24

with the post office they're basically

play14:27

another address that you can send mail

play14:29

to they then forward that mail via their

play14:32

own service

play14:32

to your home address meaning that they

play14:35

know your home address

play14:36

so using a vpn will actually hide you

play14:38

somewhat from the place that you're

play14:40

trying to connect to

play14:41

but it won't make you disappear in order

play14:43

to disappear you need to actually have

play14:44

your ip address disappear or to change

play14:48

this is where the tor web browser comes

play14:50

in what tor does

play14:51

is it randomizes your ip address so that

play14:54

it looks like you're someone else

play14:56

somewhere else your ip address becomes

play14:59

virtually invisible not entirely but

play15:01

extremely close

play15:02

and again i will explain how to become

play15:04

entirely invisible

play15:06

later on in the video in level 3

play15:08

anonymity tor also uses

play15:09

end-to-end encryption meaning that it

play15:11

will encrypt every request you send

play15:14

it also encrypts your data multiple

play15:16

times

play15:17

so you can think of that as layers of an

play15:19

onion

play15:20

each time they encrypt your information

play15:22

another layer is added to the onion

play15:24

this is why this method is referred to

play15:26

as onion routing

play15:27

and it also makes it virtually

play15:29

untraceable

play15:31

so for most of us looking to browse the

play15:32

web anonymously

play15:34

tor will do what we need the second step

play15:36

to level two anonymity is to use

play15:38

encrypted messaging

play15:39

apps like chat secure and signal are

play15:42

the most commonly used ones and the ones

play15:44

that are considered the most

play15:46

anonymous there's also whatsapp that

play15:48

uses end-to-end encryption

play15:50

but it's owned by facebook so there is

play15:53

some debate

play15:54

as to whether or like how safe it

play15:56

actually is you also need to activate

play15:58

this feature for each chat

play15:59

and the person or persons that you're

play16:01

chatting to also needs to enable it

play16:03

the idea for increased anonymity is

play16:05

essentially just

play16:06

to use more encryption usually the more

play16:09

encrypted something is

play16:10

the more anonymous it becomes so look

play16:13

for apps that allow for end-to-end

play16:14

encryption for messaging

play16:16

emailing and phone calls for emailing

play16:19

protonmail is one choice of service that

play16:21

you can use

play16:22

you can also use something like

play16:23

mailvelope which is something that you

play16:25

can use

play16:26

in combination with your regular email

play16:27

provider to encrypt your emails

play16:30

and ideally you would use these two in

play16:32

combination with the tor web browser so

play16:34

now we're getting closer to becoming

play16:36

completely invisible

play16:38

now you know how to achieve level one

play16:41

anonymity and level two anonymity

play16:43

you're hard to hack and you're hard to

play16:45

track so now let's take this to the next

play16:48

level in

play16:49

every sense of that word level three

play16:52

total invisibility all right so this is

play16:54

going to escalate

play16:55

really quickly and that is because it's

play16:58

fairly easy to become

play16:59

almost invisible but to disappear

play17:02

entirely without a trace

play17:05

is it takes a lot of effort and so let

play17:08

me explain how it can be done so your ip

play17:10

address can be used to track you down

play17:12

but there are other things that can be

play17:13

used as well

play17:14

like the device that you're using the

play17:16

operating system or the wi-fi

play17:18

or internet that you are connected to

play17:20

your internet service provider or isp

play17:22

screen size and even resolution all of

play17:25

these things can be used to different

play17:26

effectiveness to

play17:27

try to build up an idea of who you are

play17:29

and where you are

play17:31

so if we want to become completely

play17:32

invisible then we need to account for

play17:34

all of these things

play17:36

so here's how to do that so firstly

play17:37

we're going to address the tiny

play17:39

vulnerability in the tor web browser

play17:41

that could potentially expose who you

play17:43

are or where you're at

play17:45

and this is known as the exit node

play17:47

problem so if you remember earlier i

play17:49

explained that tor

play17:50

randomizes your ip address and this is

play17:53

done using nodes

play17:54

which are essentially routers all over

play17:56

the world so

play17:57

when you connect to a website via tor it

play17:59

will encrypt your request

play18:01

and send it through several randomly

play18:03

selected nodes on the tor network

play18:05

and then finally it will arrive at the

play18:07

website that you connected to

play18:09

everything is encrypted and safe all the

play18:11

way until we reach what is called the

play18:13

exit node

play18:14

which is essentially the last router

play18:16

before we get to the website

play18:18

at this stage the request is decrypted

play18:20

and sent in plain text so that you can

play18:23

actually access the site

play18:24

so the problem here is that the person

play18:26

who controls the exit node could

play18:27

potentially

play18:28

figure out who sent the request and if

play18:30

they do that then you're no longer

play18:31

anonymous

play18:32

especially not if you're using your home

play18:34

computer there are a few options for

play18:36

protecting against this

play18:38

the first one is to use what is called a

play18:40

proxy you can think of a proxy as

play18:42

essentially a computer that is somewhere

play18:44

else

play18:44

so what you could do then is that you

play18:46

could connect to this proxy or

play18:48

computer remotely and then you could

play18:51

access tor

play18:52

via that proxy and then the exit node

play18:55

doesn't know about your details it only

play18:57

knows

play18:58

about the proxy's details the problem

play19:00

with proxies is that

play19:01

you might not actually be able to trust

play19:02

them since you might not be the person

play19:04

that actually controls the proxy

play19:06

and so the way to solve this is to

play19:09

either become the proxy

play19:10

or to create your own proxy and both of

play19:13

these are possible

play19:14

and they both have different advantages

play19:16

and disadvantages

play19:18

so let's start with actually creating

play19:20

your own proxy this essentially just

play19:22

means that you need to set

play19:24

up a computer somewhere that has

play19:25

internet connection and that is always

play19:27

on

play19:28

one way that this could work in theory

play19:29

is to connect a raspberry pi to a public

play19:32

wi-fi somewhere and then hide it

play19:33

somewhere there

play19:34

so as you can tell we're getting to some

play19:36

really next level

play19:38

things right now but the idea is that

play19:39

you buy a raspberry pi using cash

play19:42

somewhere and then you set it up so that

play19:43

you can access it remotely

play19:46

then you go to starbucks or somewhere

play19:48

where there's a public wi-fi that you

play19:50

can connect to

play19:51

and you basically leave the raspberry pi

play19:53

there if you hide it thoroughly

play19:55

then it will be there for longer and now

play19:57

you can connect to your own proxy server

play19:59

from home that you actually control

play20:01

and you can browse the web using tor and

play20:03

you will be invisible when you browse

play20:05

the other option here is to become the

play20:07

proxy and this is high effort

play20:10

but it's definitely doable to do this

play20:12

you need to do a couple of things you

play20:13

first need to buy a

play20:14

laptop somewhere using cash so that it

play20:17

can't be traced back to you

play20:19

and then you need to never turn that

play20:20

computer on anywhere near your home

play20:23

only turn it on when you're away or

play20:25

quite far away from your home

play20:27

so this essentially becomes a useless

play20:30

computer

play20:31

you can only use it in public places or

play20:33

at least in places with public wi-fi

play20:35

and this means that even if you connect

play20:37

to a compromised exit node

play20:39

nothing can be traced back to you since

play20:42

even if we get to your ip address

play20:44

there will be no record of who bought it

play20:46

and you are in a starbucks

play20:48

so we also cannot figure out where you

play20:50

live however if we're getting this far

play20:52

into it then we have to assume that

play20:54

someone is determined and looking to

play20:56

actually get you

play20:57

which means that we need to be

play20:58

considering things like actually

play21:00

surveillance footage or

play21:02

security cameras and so the way to avoid

play21:05

that is essentially to hide your face in

play21:06

some sort of way for these cameras

play21:09

and right now this is actually a pretty

play21:11

good time because right now

play21:12

face masks are actually socially

play21:14

acceptable because of the

play21:15

thing that's going on and so therefore

play21:18

what you could do is you could just put

play21:20

on a face mask put up a hoodie

play21:22

and that way you'd actually be able to

play21:24

hide yourself fairly well from

play21:26

surveillance footage it'd be really

play21:27

difficult to actually figure out who you

play21:29

are from

play21:30

that we can solve the problem of

play21:31

security cameras in other ways

play21:33

mainly by buying a prepaid burner phone

play21:36

or a 4g

play21:37

internet modem that you can use to

play21:39

connect to the internet

play21:40

what you do here is again wear a face

play21:42

mask along with a hoodie

play21:44

and you become almost unrecognizable

play21:47

then you go into a store and you pay

play21:48

with cash to get a phone with a prepaid

play21:51

sim card that has

play21:52

data i would recommend getting a phone

play21:54

over a 4g

play21:56

internet modem because with a phone you

play21:58

actually get a phone number and this

play22:00

phone number can then be used to set up

play22:02

an anonymous email with gmail you can

play22:05

actually use gmail anonymously

play22:07

but you would need to take all of these

play22:09

previous precautions

play22:10

burner phone and basically a burner

play22:12

laptop because when you sign up for

play22:14

gmail you need a phone number to verify

play22:16

your account

play22:17

so for that you can use your new

play22:19

anonymous phone number

play22:21

and voila you now have an anonymous

play22:23

gmail account

play22:25

now of course you need to make sure that

play22:26

you never search for things that can be

play22:28

related to you

play22:30

in any sort of way and you also need to

play22:32

make sure that you again never turn them

play22:34

on inside your home or anywhere close to

play22:36

your home

play22:37

and ideally that you also turn them on

play22:39

only in randomized spots so that you

play22:41

keep

play22:41

randomizing where you turn it on if you

play22:43

always turn them on and use them at the

play22:45

same starbucks

play22:46

three streets down from your home then

play22:48

your location is now a lot more easy to

play22:50

track

play22:51

we can narrow it down to somewhere near

play22:54

this place

play22:55

if you look up the weather that can also

play22:57

be used to figure out your

play22:58

location if you ever enter in some sort

play23:01

of personal

play23:01

information into any form of search that

play23:04

you do

play23:05

then you're compromised so i'm guessing

play23:07

at this point that most of you

play23:09

realize that this sort of anonymity is

play23:11

not really feasible for most of us

play23:13

it's just too much effort to actually

play23:15

maintain and too little reward

play23:18

and so i would say that unless you're

play23:21

doing something illegal

play23:23

then level two anonymity is really where

play23:25

you wanna be at

play23:26

and maybe even slightly less than level

play23:28

two because becoming truly invisible is

play23:31

really hard work and most of us really

play23:33

don't need

play23:34

true invisibility so yeah that's it for

play23:37

this one i hope you enjoyed it and that

play23:39

you learned something about this

play23:40

and how to browse the web anonymously i

play23:43

will leave links to

play23:44

all the things that are mentioned and

play23:46

also some resources

play23:47

like the art of invisibility by kevin

play23:49

mitnick which was a huge help for making

play23:52

this video

play23:53

and yeah i hope you enjoyed it make sure

play23:55

to subscribe if you want to see more

play23:57

videos like this and i hope i'll see you

play23:59

in the next one

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
AnonymitätDatenschutzTor-BrowserPasswort-SicherheitOnline-SicherheitVPNDaten-VerschlüsselungPrivatsphäreCyber-SicherheitHacker-Schutz
¿Necesitas un resumen en inglés?