How to Be Invisible on the Internet. 10 Identifiers to Eliminate
Summary
TLDREl video destaca 10 identificadores que pueden comprometer la privacidad en línea y ofrece estrategias para ocultarlos. Aborda temas como direcciones IP, números de teléfono, identificadores de hardware, cookies, y más, priorizando cada uno según su nivel de amenaza. Resalta el uso de VPN, navegadores anónimos, y la separación de identidades en diferentes plataformas para proteger la privacidad digital.
Takeaways
- 🕵️♂️ La invisibilidad en Internet implica ocultar tus identificadores para mantener tu privacidad en línea.
- 🌐 La dirección IP es el identificador más básico y peligroso, debe ser protegida utilizando VPN.
- 📱 Los números de teléfono han convertido en una forma de identificación en Internet, se recomienda usar un número separado para la autenticación de dos factores.
- 📱 Los identificadores del teléfono móvil, como el IMEI y el MZ, son importantes pero no visibles para las plataformas a menos que se utilice un OS que los registre.
- 🖥️ Las direcciones MAC son indirectas y no visibles automáticamente, pero algunas aplicaciones pueden recolectar esta información.
- 🔢 Los identificadores del hardware y los números de licencia del OS son recolectados por las plataformas y pueden ser enviados a través de aplicaciones.
- 🎯 Los ID publicitarios son identificadores temporales que se pueden desactivar o cambiar con facilidad.
- 🍪 Las cookies y los rastreadores de huellas digitales son usados principalmente para publicidad y pueden ser mitigados con un navegador que borre las cookies después de cada sesión.
- 📍 La trazabilidad de la ubicación es muy peligrosa y puede revelar tu identidad, se debe usar un VPN y desactivar las permisos de ubicación.
- 🔐 La ID de Google y Meta son las más peligrosas ya que pueden vincularse con otras identificaciones y rastrearte en todo Internet.
- 📧 Las direcciones de correo electrónico son también identificadoras y se recomienda usar diferentes para cada plataforma.
Q & A
¿Qué significa estar invisible en Internet y cómo se puede lograr?
-Estando invisible en Internet significa que aún estás conectado y realizando actividades en línea, pero no puedes ser identificado ni rastreado por terceros. Se puede lograr mediante la ocultación o disminución de identificadores que te acompañan en el ciberespacio, como direcciones IP, números de teléfono, identificadores de hardware, cookies, entre otros.
¿Por qué es importante ocultar tu dirección IP en Internet?
-La dirección IP es un identificador fundamental que acompaña cada petición que realizas en Internet. Si tu dirección IP es visible, es posible que te rastreen o te identifiquen, lo que compromete tu privacidad y seguridad en línea. Usar un VPN (Virtual Private Network) te permite ocultar tu dirección IP real y reemplazarla con la del servidor del VPN, dificultando que otros te rastreen o te identifiquen.
¿Qué es un VPN y cómo funciona para proteger mi identidad en línea?
-Un VPN, o Red Privada Virtual, es un servicio que cifra tu conexión a Internet y redirige el tráfico a través de un servidor remoto. Al hacer esto, oculta tu dirección IP real y te asigna una nueva, diferente, que corresponde al servidor del VPN. Esto ayuda a proteger tu privacidad, evitando que terceros te rastreen o vean tus actividades en línea.
¿Qué son los identificadores de hardware y por qué pueden ser problemáticos en términos de privacidad?
-Los identificadores de hardware son números únicos asignados a los dispositivos, como direcciones MAC, números de serie de la CPU y números de licencia de sistemas operativos. Estos identificadores pueden ser recopilados por las plataformas y aplicaciones para rastrear y识别 tus dispositivos, lo que compromete tu privacidad. Para proteger tus identificadores de hardware, se puede utilizar un teléfono Google o una máquina virtual en tu computadora.
¿Qué es la identificación de publicidad y cómo se puede manejar para proteger mi privacidad?
-La identificación de publicidad es un identificador temporal que se utiliza para segmentar y mostrar anuncios publicitarios personalizados. Estos identificadores son enviados con el tráfico de la aplicación y pueden ser recopilados por las plataformas. Para proteger tu privacidad, puedes optar por no participar en la recolección de identificadores de publicidad o cambiar el identificador de publicidad con frecuencia en las configuraciones de privacidad de tu dispositivo.
¿Qué son las cookies y por qué pueden ser problemáticas en términos de privacidad?
-Las cookies son pequeños archivos de texto almacenados en tu dispositivo por los sitios web visitados. Estas cookies pueden ser utilizadas para rastrear tus hábitos de navegación y mostrarte anuncios personalizados. Para proteger tu privacidad, puedes utilizar un navegador que automáticamente elimine las cookies después de cada sesión o configurar tus opciones de privacidad para limitar su uso.
¿Qué es el seguimiento de ubicación y por qué es peligroso en términos de privacidad?
-El seguimiento de ubicación implica la recolección de datos sobre tu ubicación física, que puede ser utilizada para rastrear tus movimientos y conocer tus hábitos. Esto puede ser especialmente peligroso si se combina con tu dirección IP, lo que permite a terceros identificar exactamente quién eres y dónde estás. Para proteger tu privacidad, siempre utiliza un VPN y desactiva las permisos de ubicación en tus aplicaciones y dispositivos.
¿Cómo pueden las identidades de Google y Meta (Facebook) afectar mi privacidad en línea?
-Las identidades de Google y Meta (Facebook) son cookies y tecnologías de seguimiento que permiten a estas compañías rastrear tus actividades en línea y recopilar datos personales. Cuando estas identidades están asociadas con tus actividades en línea, pueden ser utilizadas para construir un perfil detallado sobre ti. Para proteger tu privacidad, aísla tu uso de Google y Meta en diferentes navegadores y evita compartir tu información personal en estas plataformas.
¿Qué es un teléfono Google y cómo puede ayudarme a proteger mi privacidad?
-Un teléfono Google es un dispositivo móvil que utiliza un sistema operativo basado en Android Open Source Project (AOSP). Estos teléfonos no tienen una conexión con Google y no acceden a los identificadores de hardware del dispositivo, lo que reduce la cantidad de información que se puede recopilar sobre ti. Utilizar un teléfono Google puede ayudarte a proteger tu privacidad al evitar que Google y otras empresas recopilen tus datos de navegación y otros datos personales.
¿Cómo puedo proteger mi información de contacto, como mi número de teléfono y mi dirección de correo electrónico, en línea?
-Para proteger tu información de contacto en línea, puedes utilizar números de teléfono y direcciones de correo electrónico diferentes para cada plataforma o servicio en línea. Asegúrate de no compartir estas cuentas en contacto con otras personas y opta por servicios de correo electrónico que no muestren tu información en listas de contactos, como el servicio de correo electrónico bmail.
¿Qué medidas adicionales puedo tomar para aumentar mi privacidad en línea?
-Además de las medidas mencionadas anteriormente, puedes utilizar navegadores que bloquean anuncios y seguimiento, como el navegador Brave, y evitar el uso de plataformas que son conocidas por recopilar datos de usuario. También es importante mantener actualizado el software de tus dispositivos y utilizar contraseñas seguras y únicas para cada cuenta en línea.
Outlines
🕵️♂️ Identidad Invisible en Internet
Este párrafo aborda la importancia de mantener una identidad anónima en línea. Se discuten los diferentes identificadores que nos acompañan en el internet y las aplicaciones, y se enfoca en cómo ocultar estos 10 identificadores para proteger nuestra privacidad. Se menciona el uso de VPN, la protección de la dirección IP y la importancia de no compartir información personal en línea.
📱 Protección de Números de Teléfono e IMEI
En este párrafo se discuten los riesgos de compartir números de teléfono y la identificación única del IMEI en dispositivos móviles. Se sugiere la utilización de un número de teléfono separado para la autenticación en dos pasos (2FA) y se explica cómo las grandes empresas de tecnología pueden acceder a nuestra información de contacto y cómo esto puede comprometer nuestra privacidad en línea.
💻 Protección de la Dirección MAC y de la Hardware
Este párrafo se centra en la protección de la dirección MAC, un identificador único en dispositivos inalámbricos, y en los identificadores de hardware en computadoras. Se discute cómo las aplicaciones pueden recopilar esta información y cómo la solución para proteger esta información es el uso de un teléfono Google con un sistema operativo basado en Android open-source (AOSP).
🖥️ Identificadores de Hardware y de Sistema Operativo
Este párrafo cubre los identificadores de hardware y los números de licencia del sistema operativo, específicamente en sistemas Windows. Se sugiere el uso de una máquina virtual para proteger esta información y se menciona que cualquier aplicación puede acceder a estos identificadores, lo que representa un riesgo para la privacidad del usuario.
🎯 Control de Identificadores de Publicidad y de Rastreadores de Cookies
Este párrafo aborda los identificadores de publicidad y los rastreadores de cookies, que se utilizan principalmente para fines publicitarios. Se explica cómo optar por no recibir estas identificaciones y cómo cambiar la identificación de publicidad regularmente puede reducir su impacto en la privacidad. Sin embargo, se señala que estos no son los principales problemas si no están vinculados a una cuenta de Google o Facebook.
🌐 Rastreo de Ubicación y Protección de la Privacidad
Este párrafo enfatiza el peligro del seguimiento de ubicación y cómo, si se permite, puede resultar en la pérdida de privacidad. Se menciona la importancia de utilizar un VPN para proteger la información de ubicación y se sugiere apagar siempre las permisos de ubicación, especialmente al estar en casa.
📧 Uso de Direcciones de Correo Electrónico Distintas para Plataformas
Este párrafo explica cómo el uso de una dirección de correo electrónico única para cada plataforma puede ayudar a proteger la privacidad. Al evitar que las plataformas vinculen la dirección de correo electrónico con otras formas de identificación, se reduce la posibilidad de que se pueda rastrear la actividad en línea del usuario.
🛠️ Herramientas y Soluciones para la Privacidad en Línea
Este párrafo presenta una serie de soluciones y herramientas para mejorar la privacidad en línea, como el uso de teléfonos Google, servicios VPN, la creación de una empresa dedicada a soluciones de privacidad y la promoción de productos como el Brax router y el servicio de correo electrónico Brax mail. Se enfatiza la importancia de comenzar a implementar estas medidas para proteger la privacidad en el futuro.
Mindmap
Keywords
💡Invisibilidad en Internet
💡IP Address
💡VPN (Virtual Private Network)
💡Identificadores de hardware
💡Cookies y seguimiento del navegador
💡Google ID y Meta ID
💡Traza de ubicación
💡Email como identificador
💡Publicidad ID
💡Huella digital del navegador
💡IMEI y MZ
💡MAC address
Highlights
The internet is designed to track us, and eliminating identifiers is key to becoming pseudo-anonymous online.
IP addresses are fundamental to internet communication and can be hidden using a VPN.
Phone numbers have become internet IDs and can be used to link multiple accounts to a single individual.
IMEI and SIM card identifiers like MZ can be tracked by governments using devices like Stingray.
MAC addresses, while not automatically visible, can be collected by certain apps for privacy-invasive purposes.
CPU identifiers and OS license numbers can be retrieved by apps and sent to platforms.
Advertising IDs are temporary but often permanent identifiers used for targeted advertising.
Cookie trackers and browser fingerprints are used for advertising but can be minimized by using privacy-focused browsers.
Google ID and Meta ID are high-threat identifiers that can be isolated to specific browsers to prevent tracking.
Location tracking can reveal a person's real name and address if combined with an IP address.
Email addresses used as logins can be connected to contact lists and reveal a user's identity.
The main threat to privacy is the Google ID, which can be mitigated by using a Google Phone and a VPN.
Using different email addresses for each platform can prevent email addresses from being used as identifiers.
The transcript emphasizes the importance of starting to implement privacy measures as soon as possible.
The speaker has started a company to help with private solutions, offering various products like Google Phones, VPN services, and email services.
The speaker's live streams have moved to Rumble and ROBRA.LOCALS.COM, occurring on Thursdays at 8:00 p.m. Pacific Time.
Transcripts
how can you be invisible on the internet
invisibility means you're still on the
internet but no one can see you there
the problem will be from certain
identifiers that accompany you as you
surf the interwebs or use apps in this
video I'll discuss 10 of these
identifiers what I will explain today is
how to hide these 10 identifiers so no
one can tell who you are have I caught
your interest if so then stay right
[Music]
there let's start with a basic premise
the internet is designed to track US
ever since the internet was invented to
even send information from one internet
node to another required
addressing thus we have the IP address
IP addresses are often fixed and
longterm phones obviously have phone
numbers but but they also have the IMEI
which is attached to the cell baseband
modem phone subscriptions are connected
to the imy identifier phone numbers are
in databases of contact list that big
Tech platforms collect on the network we
also have Hardware identifiers each
network connection whether to Bluetooth
internet cell data all require another
identifier called the MAC address this
is unique to each device on wireless
devices these Mac addresses are even
broadcast over the air so listening
devices nearby can read them Computing
devices have serial numbers built in for
example like CPU
identifiers operating systems also have
license numbers that are unique to your
device for example on Windows this is
the Windows product ID there are
temporary identifiers that are used to
Mark devices on phones there is the
advertising ID which is an identifier
made known to advertises to recognize
your device on all browsers platforms
can drop a little identifier on your
device called a cookie so that websites
can track you they can also do a browser
fingerprint so they can recognize you if
you return every time you log into
Google Facebook or Instagram traces of
those IDs are visible on most platforms
and they can then be used to track you
over the
Internet another way of identifying you
is via location tracking if your
location is recorded that is easily
transformed into a street address then
of course there are plenty of public
databases that can convert that to a
real name finally you often use an email
address to log in to various platforms
these email addresses are in contact
list as well as records of the platform
itself the email address is often a
direct identifier by itself fact if you
do nothing everything you do on the
internet can be attributed to you using
some or all of these
identifiers your goal if you want to be
invisible on the Internet is to
eliminate as many of these identifiers
from your internet actions this way you
become pseudo Anonymous you're there but
no one knows who you are exactly let's
jump into the 10 identifiers that we
will try to remove from your internet
action today I will indicate a threat
level with each of these from 1 to 10 so
you can prioritize which to work on
first this list is not sorted by threat
levels so watch them all number one IP
address Threat Level 10 out of 10 this
identifier is the most basic and should
be the most feared you cannot go on the
internet and do any kind of data
exchange without passing an IP address
the question is if the the IP address is
yours one of the most important
techniques for protection is to use a
VPN a VPN shows the IP address off the
VPN service and not yours this is
critical in the home if you're using a
Broadband cable modem to supply your
internet why is this critical because
your IP address at home sticks with you
my IP address at my home hasn't changed
in 20 years the ISB obviously knows who
I am since they send me a bill and send
technicians to fix my
internet and they have a record of the
IP address assigned to me at any given
moment any website or app you visit can
see this IP address even worse your
emails include this IP address if you're
using some standard email product and
your IP address is sent to the email
service provider and it's even in the
header of every email you send to others
let me alter the threat scenario here
sometimes you do not need a VPN
currently the Internet only routs
traffic using IP addresses in IP V4
format version 4 most cell phone
carriers and starlink now use the new
IPv6 format internally on their Network
version six this means that they can not
pass an ipv4 address unique to you to
any platform watching your traffic you
in fact share ipv4 addresses with all
the users of the cell service or
starlink the IP addresses that appear
for your traffic is actually the
carrier's ipv4 router that connects to
the internet and translates the IPv6
address of all of the people on that
location this means means that even
without a VPN you are invisible already
as long as you're not using your own
cable modem on your home network this
gives you another option to protect your
IP address without an additional cost
another option is to use tour a tour
browser will anonymize your IP address
and is the most invisible of all options
and it is free however you will find
that many sites now reject tour
connections because hackers tend to use
tour it is also terribly slow so this
becomes impractical Beyond occasional
use also think about the email using
email services that don't show your IP
address we for example have a bmail
product that does that no IP addresses
on the header number two phone numbers
Threat Level 8 out of 10 phone numbers
have turned into an internet ID
especially since most people have mobile
phones and every platform knows that
what really identifies you is if you go
to a platform and you give them your
phone number for twoof Factor
authentication or
2fa obviously this means if you set up
multiple accounts let's say in Google
then they will know which accounts
belong to the same person just from the
phone number but this in itself isn't
the main identifier phone number
directories are known to carriers but
are not distributed anymore the main
source of phone number directories which
reveal your name and potentially your
address are actually the contact lists
uploaded by your friends you cannot
control this and there is a 99% chance
that your oldtime phone number is in
some contactless database in a big Tech
platform they don't have to pay for this
and it is uploaded willingly so when
when you give a platform your regular
phone number for tofa then they can
actually verify what your real name is
well there goes your invisibility the
solution is actually simple have a
dedicated phone number for TFA a second
phone number you can put it on another
phone it will need another sim card you
must never give this number out to any
contact so it doesn't appear on a
contact list the effect is immediate if
a platform seeks to identify you your
phone number will not match to anyone's
contact list you will be invisible your
main phone number can be the same your
friend can call you on that but never
use that main phone number for TFA with
one exception that I make and that is
for
banks number three IMI and MZ Threat
Level 9 out of 10
your mobile phone has so many
identifiers so we'll start with these
two the MZ is attached to your sim card
when you insert a SIM card your phone
will actually broadcast This MC on the
airwaves this is a specific threat when
dealing with government since they can
use a device called Stingray to listen
for
MZ the other identifier is the IMEI
which is permanently attached to your
phone Hardware it sticks with you until
you change phones but neither of these
are the threat to the internet
invisibility the reason is that a
platform cannot see your IMEI or MZ
directly and governments only look at it
if they use it on radio interception for
example if you go to Tik Tok it cannot
find your IMI or MZ the real threat is
from the phone OS which is Google
Android or Apple iOS these OS can
identify your device identifiers and
store it on their database so this ruins
any plans for invisibility on these
devices you cannot hide from the OS of
what I call a normie phone the best
solution for a phone is to use a the
Google Phone this means having a phone
with a different OS based on Android
open- source project or
AOSP these kinds of phones do not have a
connection with Google and do not give
access
to the hardware identifiers this has a
high Threat Level because these
identifiers are used to track you on all
other devices with a technique called
cross device tracking number four Mac
addresses Threat Level two out of 10 Mac
addresses are indirect identifiers this
is a common misconception about the
seriousness of a MAC address by many
people the MAC address is not visible to
any platform automatically it is not
part of the Internet Protocol however
some apps intentionally collect the MAC
address and then use this in extremely
privacy invasive ways the main culprit
here is meta these apps actually spy on
the Mac addresses of the local area
network these then can be used to verify
your
identity it is also used to spot you in
other environments other Zuck book users
can detect your Mac address at a Walmart
Wi-Fi for example and then Zach will
know you are at Walmart or that you are
near other people the other way that Mac
addresses are dangerous is through the
listening of Bluetooth Mac address
broadcast which have been added to iOS
and Google Android this was added to
these os's to do contact tracing during
the covid crisis although I can't be
certain they collect this data today the
phones have a builtin capability to
collect other Bluetooth Mac addresses
near it the solution is to use a the
Google phone not that this can stop
others from listening to your Mac
address that will
continue however the MAC address will
not be connected to you since Google
will not know it belongs to you it will
just be some random Mac address and
again I repeat this a the Google phone
has no Google ID so that's why secondly
be sure to not use any zaching meta
platform since they are the primary
users of Mac address tracking number
five CPU identifiers and Os license
numbers Threat Level two out of 10 let's
say you're using
Windows this will have a similar problem
to the mobile phone using iOS or Google
Android it would be be possible for apps
to send the CPU identifier or the
Microsoft product ID to the platform the
problem is that this threat is not
limited to a Microsoft any app could
retrieve this information on Windows
this is available in the Windows
registry if a platform requires access
only via an executable rather than a
browser this should alert you to the
possibility that this additional
information is retrieved obviously anyos
can collect this and send it to HQ but
it is more of a threat when it is used
with specific knowledge of what you're
doing by some app let's say you are
required to use an app to access some
corporate system then that corporate
system could see if you're a valid user
by sending the Microsoft product ID from
your computer this can then be used to
check that the hardware is validated as
well the problem is any app could do
this the solution is to use a virtual
machine on your computer nowadays a
virtual machine software is not so slow
anymore on Windows and Linux the common
free virtual machine software is virtual
box from Oracle it is free and the best
way is to actually install Linux on the
virtual machine virtual machines do not
have an actual Hardware identifier for
the CPU and by using Linux you eliminate
the the risk of the OS identifier being
sent number six advertising IDs Threat
Level one out of 10 advertising IDs are
temporary identifiers used on your
devices to attract you now I say
temporary but likely 99% of you would
keep the same advertising ID for the
long term because you will not disable
this it's an extra step and many of you
don't even know what it is the
advertising ID is a volum voluntary
identifier that is sent with any traffic
and retrieve by apps there's an
advertising ID on all operating systems
outside of Linux and the Googled os's
both mobile and desktop the solution to
this is to opt out you can opt out from
Google Android Apple iOS Mac OS and
windows or if you cannot opt out you can
change the advertising ID frequently in
some privacy settings
the OS can generate a new one this is a
threat only from thirdparty platforms by
the way and it is not a permanent threat
Google and apple can track you via other
means if you're using their OS so
fortunately this is a threat with a
limited scope number seven cookie
trackers and browser fingerprints Threat
Level two out of 10 cookie trackers and
fingerprinting your browser are
alternate ways of identifying you for
advertising purposes similar to the
advertising ID Believe It or Not these
are not all that important to your
invisibility unless they're connected to
your Google ID or some meta ID so let's
wait to explain a more detailed solution
in the next item absent the Google ID or
meta ID these trackers have a very
short-term impact they can identify you
temporarily but it is not permanent so
this is not as important as it would
seem at least until a Google ID is
matched to it for this reason I don't
really do anything special to cookies in
general sites will always ask you to
accept cookies and I do accept them
mostly there are browsers that will
automatically delete cookies after each
session and that really is the only
important solution for example Brave
browser will do this automatically clear
cookies if you feel this to be a threat
in some way browser fingerprinting
specifically can be minimized by making
your browser as plain vanilla as
possible do not use browser extensions
and use many browsers as a habit you can
even use a different time
zone number eight Google ID and meta ID
Threat Level 10 out of 10 as I just
explained the cookie and browser
fingerprint problem isn't that serious
until you add the Google ID into the
equation I'll add meta in here later the
specific threat comes from the Google ID
being stored in a cookie when you are
logged into Google on a browser this
Google ID will be in a cookie for sure
the effect of this is that any website
with Google analytics Google AdSense
will automatically detect this Google ID
since the majority of all websites have
Google analytics or AdSense then it is
safe to say that Google will know
practically every website you visit and
it will be specifically attributed to
your Google ID meta has their own
equivalent like the Facebook like button
which will capture your IDs from meta
properties like Facebook WhatsApp and
Instagram the solution is to isolate
these to a separate browser only use
Google on One browser if you're logged
in for example Chrome but do not go to
any other website on Chrome do it from
another browser this way the Google ID
or any meta ID will not leak anywhere
you can go to Google on another browser
as long as you never log in to Google on
that browser I hesitate to give a
solution for meta because of the MAC
address tracking I mentioned earlier
among other things they also do facial
recognition the best solution is to
abstain from meta number nine n location
tracking Threat Level 9 out of 10 the
risk of location tracking is that if you
are Cavalier about this piece of data
and don't turn off location permissions
on everything at some point some third
party will capture your location
information with your IP address this is
a frequently sold piece of information
by thousands of apps and unfortunately
once your IP address is recorded with
the location then anyone can do a lookup
and find out exactly who you are just by
looking at your IP address either as
capture by an app a website or through
your email the result will be that you
will be in a lookup database sorted by
IP address and from there it will show
your location there are many suppliers
of this data including companies like
here.com and Skyhook Wireless the
solution is to always use a VPN because
the location information if accidentally
captured is a value only it's a data
pair with your IP
address and of course always turn off
location permissions especially if
you're at home you can never be sure
which apps are selling your location and
IP address data one of the most
well-known apps that do this is the
weather channel app which is owned by
IBM the other fear with location
tracking is that Google and apple always
know where you are 247 your location
data is then used to provide Geo fencing
services to government agencies if
you're using a d Google phone then you
are safe from this number 10 email
address used as login Threat Level 6 out
of 10 if you use a specific email
address to log to a platform then the
platform can check the same contact list
where they find your phone number to
also see your real name
so in essence the phone number and email
are connected identifiers the solution
here is to use different email addresses
for each platform some email products
can allow an ilas like
bmail this ensures that your email will
not be found in any contact list since
you will not give this alas email to
your contacts so there you are 10
identifiers that you must attempt to
hide from the internet at all times use
the Threat Level to gauge the importance
of these to your privacy actions
unfortunately know that you cannot
delete data that is already known on the
internet you can only move forward to
eliminate future data keep that in mind
the sooner you start implementing these
actable items the better for your
privacy good luck privacy is something
we all have to work on it does not come
to us automatically I try to make it
easier by starting a company to help the
average person with private Solutions
the main threat currently is the Google
ID which is on your phone there are
hidden Communications between common
phones and big Tech which reveal device
identifiers and 24/7 location tracking
that points to you we sell various
models of the Google phones in our store
these phones are around $400 so they are
cheaper than normal phones we have the
bytes VPN service which I started a few
years ago as I discussed in this video a
VPN is important to hiding your IP
address our VPN service is unique
because it includes ad blocking via a py
hole server which also serves to
anonymize your DNS we have a related
Brax router product that can allow you
to VPN your entire home internet traffic
this keeps everything simple if you have
many devices we have a Brax mail service
that hides identity information from
your email and prevents you from showing
up on contact lists it also eliminates
IP addresses from showing up on the
header or in logs we offer unlimited
aases seven domains and web mail check
that out for $50 a year all these are on
my store on bra. May sign up on there
and you will not be asked for personal
information like email I also want to
remind you that I've moved my live
streams to rumble and robra . locals.com
these live streams are on Thursdays 8:00
p.m. Pacific Time join me there if you
want to ask questions live thank you for
watching and see you again next
[Music]
time
Ver Más Videos Relacionados
Why Use Virtual Machines for Privacy and Security? Not Obvious! Top 6 List!
¿Cómo BORRAR COOKIES en Android? - 🍪 Mantén Limpio tu Móvil de Datos Innecesarios 🍪
Que no te líen - Protege tu privacidad: gestiona tu huella digital! | La tirita digital
Use an Email Alias!
Yes, you should connect to Tor via a VPN
Vuélvete Anónimo en Internet | Taller de Anonimato Online
5.0 / 5 (0 votes)