SER 100% ANÓNIMO en INTERNET en SOLO 9 PASOS

Tokin Privacy
18 Sept 202408:19

Summary

TLDRThis script discusses the erosion of privacy in the digital age, where surveillance by criminals, governments, and corporations is rampant. It highlights the importance of privacy as a fundamental right and offers solutions for individuals to protect themselves online. The video introduces tools and strategies such as anonymous SIM cards, encrypted email services like ProtonMail, privacy-focused search engines, secure browsers, and operating systems like GrapheneOS. It also covers the use of VPNs, secure messaging apps, and cryptocurrencies like Bitcoin and Monero for financial privacy, emphasizing the need for individuals to take control of their digital destiny.

Takeaways

  • 🌐 The script discusses the invasion of privacy in the digital era, where shadows of surveillance are not confined to dark streets but lurk in the cyberspace, affecting individuals, corporations, and governments alike.
  • 📱 It highlights the importance of anonymous communication, suggesting the use of SIM cards that do not require personal identification to maintain privacy.
  • 🔒 The script emphasizes the use of encrypted email services like ProtonMail (now Tutanota) that employ zero-knowledge encryption to protect the content of communications from prying eyes.
  • 📧 It advises using email aliases and temporary email addresses for different online services to enhance privacy and reduce the digital footprint.
  • 🔍 The narrator recommends using privacy-respecting search engines like Startpage and Swissc to avoid the tracking and data collection practices of mainstream search engines like Google.
  • 🏠 For web browsing, the script suggests using the mbat browser, which is designed to protect user privacy and does not track or monitor user activity.
  • 📱 The script warns against relying on mainstream operating systems like Android and iOS for privacy, recommending GrapheneOS as a more secure and privacy-focused alternative.
  • 🔒 It advocates for the use of a VPN with a strict no-logs policy and open-source software to add an extra layer of anonymity and security to online activities.
  • 💬 The script promotes the use of messaging apps like Signal and Session for secure and private communication, emphasizing end-to-end encryption and the avoidance of metadata collection.
  • 💰 Lastly, it touches on the topic of digital currencies, contrasting the surveillance potential of Central Bank Digital Currencies (CBDCs) with the financial freedom and privacy offered by cryptocurrencies like Bitcoin and Monero.

Q & A

  • What is the main theme of the video script?

    -The main theme of the video script is the importance of digital privacy and the various tools and strategies one can use to protect their privacy and freedom in the digital age.

  • Why does the script mention that shadows are now in the darkest corners of cyberspace?

    -The script mentions that shadows are in the darkest corners of cyberspace to illustrate that threats to privacy are no longer just physical but are also present in the digital world where criminals, governments, and corporations can observe and listen without being seen.

  • What is the purpose of the 'Digital Services Act' mentioned in the script?

    -The 'Digital Services Act' is mentioned as a law that, while seemingly designed to protect users, is actually used as a tool for censorship, forcing platforms like Twitter, YouTube, and Facebook to remove content and pursue those who dissent from the prevailing political opinion.

  • How does the script suggest protecting one's identity when purchasing a SIM card?

    -The script suggests that in some countries, one can purchase a SIM card without revealing their identity, or someone unrelated can buy it on their behalf, allowing the user to disappear from the radar.

  • What alternative email services are recommended in the script for better privacy?

    -The script recommends using privacy-focused email services like ProtonMail (now Tutanota) which use zero-knowledge encryption, ensuring that even the service providers cannot read the contents of the emails.

  • Why is using an alias for email important according to the script?

    -Using an alias for email is important because it allows the user to keep their real address hidden, providing layers of anonymity. If an alias is compromised, it can be discarded without affecting the user's primary identity.

  • What search engines are suggested in the script for respecting user privacy?

    -The script suggests using privacy-respecting search engines like Startpage and Swissc, which do not track users and ensure that searches remain private.

  • Why is the script critical of Google Chrome as a browser?

    -The script is critical of Google Chrome because it tracks all user activity, collecting data and observing users' online behavior, which is contrary to the goal of maintaining digital privacy.

  • What alternative operating system is recommended for mobile devices in the script?

    -The script recommends GrapheneOS as an alternative mobile operating system that does not have backdoors and respects user privacy, unlike Android or iOS.

  • How does the script view the use of VPNs for online privacy?

    -The script views VPNs as an essential tool for adding an extra layer of anonymity online. However, it emphasizes the importance of choosing a VPN with a strict no-logging policy and open-source software, such as mbat VPN or ivpn.

  • What messaging apps are mentioned in the script for secure and private communication?

    -The script mentions Signal and Session as messaging apps that protect user privacy with end-to-end encryption and a focus on not collecting metadata, ensuring secure and private communication.

  • Why is the script critical of Central Bank Digital Currencies (CBDCs)?

    -The script is critical of CBDCs because they are seen as tools for surveillance and control, allowing authorities to monitor and regulate every financial transaction, thus compromising financial privacy.

  • What cryptocurrencies does the script present as alternatives to CBDCs?

    -The script presents Bitcoin and Monero as alternatives to CBDCs, highlighting their properties of scarcity, resistance to inflation, and privacy features that allow for financial sovereignty and anonymity.

Outlines

00:00

🌐 Digital Privacy and Anonymity

This paragraph discusses the invasion of privacy in the digital age, where shadows are no longer confined to dark streets but lurk in the depths of cyberspace. It highlights the constant surveillance by criminals, governments, and corporations. The paragraph emphasizes the importance of privacy as the last frontier and the need to protect oneself in the digital era. It critiques government laws like the Digital Services Act in Europe, which appears to protect but can be used to censor and control speech. The paragraph introduces tools and methods to maintain anonymity and privacy, such as using SIM cards without revealing identity, secure email services like ProtonMail and Tutanota that employ end-to-end encryption, and using email aliases for added anonymity. It also touches on the importance of using privacy-respecting search engines and browsers to avoid being tracked online.

05:01

📱 Privacy in Communication and Finance

The second paragraph delves into the importance of secure communication and financial privacy. It warns of the interception of messages, calls, and conversations, which compromises privacy. The paragraph recommends using apps like Signal and Session for secure, end-to-end encrypted communication that does not collect metadata, which can be used for surveillance. The discussion then shifts to the choice between centralized digital currencies (CBDCs) that can monitor every transaction and decentralized cryptocurrencies like Bitcoin and Monero, which offer financial freedom and privacy. Bitcoin is highlighted as a hedge against inflation, with a fixed supply that makes it valuable, while Monero uses advanced technology to ensure completely private transactions, making it impossible to trace who sends what to whom. The paragraph concludes with a call to protect privacy as a fundamental right and to embrace tools that enable freedom and anonymity in the digital world.

Mindmap

Keywords

💡Cyberspace

Cyberspace refers to the virtual environment created by computer networks, particularly the internet. In the context of the video, cyberspace is depicted as a realm where privacy is under constant threat from criminals, governments, and corporations that monitor and observe individuals' digital activities. The script highlights how the shadows of surveillance and control have moved from physical spaces to the corners of the digital world.

💡Privacy

Privacy is the ability of an individual to seclude themselves or information about themselves and thereby express themselves selectively. The video emphasizes privacy as a fundamental right that is increasingly under attack in the digital era. It discusses how various entities are using laws and technologies to control and monitor personal information, making privacy a battleground that individuals must protect.

💡Digital Services Act

The Digital Services Act is a piece of legislation mentioned in the script as an example of how laws can be used to control and censor content on digital platforms. It is portrayed as a tool that might appear to protect users but can also be used to suppress dissenting opinions and control what people think and say online.

💡Encryption

Encryption is the process of encoding messages or information to ensure secure communication and data storage. The script discusses encryption as a magical tool that allows for secure communication through services like ProtonMail and Tutanota, which employ end-to-end encryption, ensuring that even the service providers cannot read the content of the communications.

💡Anonymity

Anonymity is the state of being unidentified or concealed. The video promotes the use of anonymous tools and services to protect one's identity online, such as purchasing SIM cards without revealing personal information or using email aliases to prevent tracking and surveillance.

💡Metadata

Metadata refers to data that provides information about other data, such as the sender, recipient, time, and subject of an email. In the context of the video, metadata is described as 'breadcrumbs' that can be used to track and profile individuals online. The video emphasizes the importance of using services that do not collect metadata to maintain privacy.

💡VPN

A VPN, or Virtual Private Network, is a service that creates a secure and encrypted connection over the internet, masking one's IP address and location. The script advises using a VPN with a strict no-logs policy to maintain anonymity and avoid being tracked online, highlighting the importance of choosing a trustworthy and open-source VPN service.

💡GrapheneOS

GrapheneOS is an open-source operating system for mobile devices that prioritizes privacy and security. The video recommends GrapheneOS as a secure alternative to mainstream operating systems like Android and iOS, which are criticized for their intrusive data collection practices and lack of user control.

💡Signal

Signal is an encrypted messaging app that the video mentions as a tool for maintaining privacy in digital communications. It is praised for its end-to-end encryption and focus on not collecting metadata, ensuring that messages remain private and secure.

💡Cryptocurrency

Cryptocurrency, such as Bitcoin and Monero mentioned in the script, refers to digital or virtual currencies that use cryptography for security. The video discusses cryptocurrencies as tools for financial freedom and privacy, allowing individuals to transact without the need for banks or intermediaries, and with a high degree of anonymity and resistance to inflation.

💡Central Bank Digital Currency (CBDC)

A Central Bank Digital Currency is a type of digital currency issued by a country's central bank. The script contrasts CBDCs with cryptocurrencies like Bitcoin, suggesting that CBDCs could be used to control and monitor financial transactions, potentially infringing on financial privacy and autonomy.

Highlights

In today's world, digital privacy is under constant attack, with governments and corporations monitoring and listening to citizens.

European Digital Services Act is criticized as a tool for censorship rather than protection.

In the UK, police departments track social media for dissenting opinions, not just violent crimes.

Freedom of speech is fading, likened to smoke in the digital breeze.

There is hope in the form of tools to resist surveillance and protect privacy.

Anonymous SIM cards can be obtained without revealing one's identity.

Email services like ProtonMail and Tutanota use end-to-end encryption to ensure privacy.

Using email aliases can protect one's real email address and maintain anonymity online.

Alternative search engines like Startpage and Swissc protect user privacy compared to Google.

The mbat browser combined with the Tor network is recommended for private web browsing.

GrapheneOS is a privacy-focused mobile operating system without backdoors or surveillance.

A VPN with a strict no-logs policy is essential for maintaining online anonymity.

Messaging apps like Signal and Session offer end-to-end encryption and protect against metadata collection.

Bitcoin and Monero are presented as tools for financial freedom and privacy.

Bitcoin is portrayed as a shield against inflation and traditional currency devaluation.

Monero's transactions are obfuscated, making them untraceable and private.

The importance of digital privacy as a fundamental right is emphasized.

Talking Privacy offers resources to help protect digital freedom and privacy.

Transcripts

play00:00

vivimos en un mundo donde las sombras ya

play00:02

no se esconden en las esquinas de las

play00:03

calles oscuras no hoy en día esas

play00:05

sombras están en los rincones más

play00:07

oscuros del ciberespacio criminales

play00:08

gobiernos corporaciones todos observan

play00:11

todos escuchan y tú estás listo para

play00:13

protegerte en la era digital la

play00:14

privacidad es la única frontera que nos

play00:16

queda pero esa frontera está bajo ataque

play00:18

constante gobiernos que se arman con

play00:19

leyes diseñadas para controlar lo que

play00:21

pensamos y decimos en Europa sin ir más

play00:23

allá la ley de servicios digitales en

play00:25

apariencia una ley para proteger en la

play00:27

práctica una herramienta para censurar

play00:30

plataformas gigantes como Twitter

play00:31

YouTube Facebook y otras obligadas a

play00:33

eliminar contenido y a perseguir a

play00:35

aquellos que disienten de la opinión del

play00:37

poder político en Reino Unido la cosa es

play00:39

aún más siniestra la creación de

play00:40

departamentos de policía dedicados a

play00:42

rastrear lo que decimos en redes

play00:44

sociales no por crímenes violentos no

play00:46

sino por opinar diferente Qué fue de la

play00:48

libertad de expresión bueno parece que

play00:49

cada vez se olvida más en una sociedad

play00:51

totalmente dormida en un escrol infinito

play00:53

la libertad de expresión se está

play00:54

desvaneciendo como humo en la brisa

play00:56

digital Pero hay esperanza en la

play00:58

oscuridad existen herramientas para

play01:00

resistir para luchar y para protegernos

play01:02

hoy te llevaré por un camino que pocos

play01:04

conocen un camino que te permitirá ser

play01:05

anónimo privado invisible hoy te voy a

play01:08

contar la historia presente y futura de

play01:10

la batalla por tu privacidad por tu

play01:11

libertad

play01:16

[Música]

play01:40

primero Comencemos por lo básico una SIM

play01:42

esa tarjetita que nos permite

play01:44

comunicarnos y tener internet en el

play01:45

dispositivo móvil para que nadie sepa

play01:47

quién eres Cuando te conectas hay países

play01:49

lugares donde no necesitas Mostrar tu

play01:51

identidad para adquirir una Incluso en

play01:53

Europa o Mejor aún alguien que no tenga

play01:54

nada que ver contigo puede comprarla por

play01:56

ti y así desapareces del radar el

play01:58

siguiente paso por supuesto es tu correo

play02:00

electrónico gmail hotmail Yahoo todos

play02:02

son espías disfrazados de amigos ellos

play02:04

leen tus correos analizan tus palabras

play02:06

tus pensamientos pero no proton mail no

play02:08

tutanota que ahora por cierto se llama

play02:10

tutamail estos servicios utilizan una

play02:13

magia llamada cifrado de conocimiento

play02:14

cero Qué significa muy sencillo que ni

play02:17

siquiera Ellos saben lo que escribes con

play02:18

quién te comunicas ni cómo lo haces lo

play02:20

que dices está entre tú y la persona que

play02:23

está al otro lado de dicha comunicación

play02:25

nadie más sin ojos intermediarios que lo

play02:28

espíen todo y te juzguen pero podemos ir

play02:30

más allá usa un alias de correo

play02:32

electrónico servicios como Adi o simple

play02:34

login permiten que tu dirección real

play02:36

esté oculta bajo capas de anonimato

play02:38

puedes generar una dirección falsa para

play02:40

cada sitio web cada suscripción si algún

play02:42

día Una de ellas es comprometida

play02:43

simplemente la eliminas como si nunca

play02:45

hubiera existido Y por supuesto creará

play02:47

alidas de correo que no tengan nada que

play02:49

ver contigo pues una de las peores

play02:51

prácticas de privacidad que exista en

play02:53

internet es utilizar un correo

play02:54

electrónico con tu nombre y apellidos Y

play02:56

por supuesto necesitarás para navegar en

play02:59

internet un motor de búsqueda Que

play03:00

respete tu privacidad Google es un

play03:02

gigante con 1 ojos pero Star page CX y

play03:05

swiss c.ch ellos no te seguirán Tus

play03:08

búsquedas serán tuyas y solo tuyas ahora

play03:11

pasemos al navegador esa aplicación en

play03:13

la que se ejecuta el motor de búsqueda

play03:15

que hemos visto anteriormente cada clic

play03:17

cada sitio que visitas es una ventana a

play03:19

tu alma digital y Google Chrome uno de

play03:21

los más utilizados es el peor lo rastrea

play03:23

absolutamente todo por ello te

play03:25

recomiendo concretamente un buscador

play03:27

especialmente diseñado para la

play03:28

privacidad por la empresa mbat en

play03:30

combinación con el proyecto abierto Thor

play03:33

uno de los navegadores más conocidos que

play03:34

permite acceder a la di web este

play03:36

navegador en concreto se llama mbat

play03:38

browser este navegador no recopila datos

play03:40

no te sigue y no te observa es la

play03:42

herramienta que te hará Navegar entre

play03:44

las sombras sin dejar rast Pero qué pasa

play03:46

con tu sistema operativo la base sobre

play03:48

la que todo lo demás se construye

play03:50

confías en Android en eos no deberías y

play03:52

mucho menos si te tragas el marketing de

play03:54

Apple respecto a la privacidad al igual

play03:56

que Google lo recopila todo y espía

play03:58

absolutamente todo lo que haces en tu

play03:59

dispositivo de hecho es peor que Android

play04:01

Pues apenas tienes libertad estás

play04:03

sometido a la tiranía de la app store el

play04:05

sistema operativo que necesitas para tu

play04:07

móvil se llama grafen os es el sistema

play04:10

operativo que será tu fortaleza digital

play04:12

no tiene puertas traseras no tiene ojos

play04:13

secretos mirando desde dentro con un

play04:15

simple pin incluso puedes destruir toda

play04:18

la información que contiene tu

play04:19

dispositivo haciendo que sea imposible

play04:21

para cualquiera acceder a tus datos sin

play04:23

embargo o verte por internet sin

play04:25

protección adicional es dejar un rastro

play04:26

una VPN es tu capa extra de anonimato

play04:29

pero no cualquier VPN Vale y mucho menos

play04:31

las que se anuncian por doquier encima

play04:33

te lo ofrecen por 3 o incluso gratuito

play04:35

Si buscas lo gratuito ya te puedes ir

play04:37

yendo por cierto porque privacidad y

play04:39

gratuito no se llevan bien en internet

play04:41

necesitas una VPN de código abierto con

play04:43

una política estricta de cero registro

play04:44

como mbat VPN o ivpn estos servicios ni

play04:48

siquiera necesitan tu nombre real puedes

play04:50

pagar de manera anónima y ellos jamás

play04:52

guardarán registro de tu actividad tu

play04:53

cuenta será anónima y el pago será

play04:55

también anónimo con ellos no hay rastro

play04:57

No hay forma de ser encontrado la

play04:59

aplicación por supuesto va más allá de

play05:01

la conexión en sí misma sino de la

play05:03

aplicación que usamos para conectarnos

play05:04

es otro campo de batalla crucial en tu

play05:06

privacidad si tus mensajes tus llamadas

play05:08

tus conversaciones pueden ser

play05:09

interceptadas Entonces tu privacidad

play05:11

está comprometida session Signal o

play05:14

simplex son Apps que son simples

play05:16

Guardianes de tu privacidad online

play05:19

protegen de la vigilancia de los ojos

play05:21

que quieren leer lo que dices con un

play05:22

cifrado de extremo extremo y un enfoque

play05:24

en no recopilar metadatos los metadatos

play05:26

son pequeñas migas de pan que van

play05:28

dejando tus mensajes y tus acciones en

play05:30

internet que pueden ser utilizados

play05:32

incluso para cosas que puesto en

play05:33

palabras el propio exdirector de la nsa

play05:36

la agencia de espionaje estadounidense

play05:38

dijo que matab gente basándose en la

play05:41

metadata Por ende es un factor a tener

play05:43

en cuenta Por ello es importante que

play05:44

utilices estas aplicaciones de

play05:46

mensajería como Signal session o simplex

play05:48

tus conversaciones se mantendrán

play05:50

privadas y no dejarán huella

play05:52

Especialmente con session Y por último

play05:54

llegamos al dinero tú eliges o el futuro

play05:56

dinero digital llamado cbdc que se está

play05:59

creando para para controlar cada céntimo

play06:01

que gastas y fiscalizar todos tus

play06:02

movimientos o eliges el dinero de la

play06:04

libertad y te estoy hablando de bitcoin

play06:06

y monero estas no son simples

play06:09

criptomonedas como otros los llamarían

play06:11

son herramientas de libertad con ellas

play06:12

puedes comprar en la web a través de

play06:14

plataformas como bit refil sin dejar

play06:16

rastro no necesitas bancos no necesitas

play06:18

intermediarios eres soberano sobre tu

play06:21

propio dinero bitcoin es más que una

play06:23

moneda es una protección contra la

play06:24

inflación su escasez su límite absoluto

play06:26

de 21 millones de monedas de las cuales

play06:28

5 millones se han perdido lo hace más

play06:30

valioso en un mundo donde los bancos

play06:32

centrales pueden imprimir sin parar

play06:34

bitcoin es tu escudo contra la

play06:35

devaluación de las monedas tradicionales

play06:37

y el espionaje del nuevo dinero digital

play06:39

monero por otro lado es el efectivo

play06:41

digital sus transacciones están

play06:42

ofuscadas por tecnología de firma de

play06:44

anillo y otros términos que ahora mismo

play06:47

no entenderás pero lo que tienes que

play06:48

saber Es que las transacciones son

play06:49

totalmente privadas sus transacciones

play06:51

están ofuscadas por tecnología punta

play06:54

haciendo imposible rastrear quién envía

play06:56

qué y a qui en persona si buscas la

play06:58

verdadera libertad fin en la red ahí la

play07:00

tienes monero tiene una tecnología única

play07:02

a este respecto el mundo digital es un

play07:04

vasto océano y tú solo un navegante pero

play07:08

con las herramientas adecuadas puedes

play07:09

deslizarte entre las olas invisible

play07:11

imparable las sombras que te intentan

play07:13

controlar te perderán de vista esos

play07:15

mismos burócratas que se creen más

play07:17

listos que nadie se van a dar contra el

play07:19

conocimiento el Ingenio humano que a

play07:21

través de la privacidad protegerá su

play07:23

libertad en un mundo donde los políticos

play07:25

cada vez están atentando más contra los

play07:26

derechos fundamentales Recuerda la

play07:28

privacidad no es es un lujo es un

play07:30

derecho y cada día que pasa es más

play07:31

importante protegerlo Bienvenido al

play07:33

futuro un futuro donde puedes ser libre

play07:35

donde puedes ser anónimo Pero la

play07:37

pregunta es estás listo para tomar el

play07:39

control de tu destino digital aquí en

play07:40

talking privacy a través de nuestro

play07:42

newsletter semanal y nuestro grupo de

play07:44

Telegram sin censura te ayudamos a

play07:46

proteger tu futuro tu libertad y la de

play07:47

tus seres queridos tú eliges o

play07:49

privacidad o esclavitud digital Únete a

play07:51

toking privacy mantente en la sombra

play07:53

Pues nadie puede cancelar a quien no es

play07:55

público y nadie puede ser arrebatado de

play07:57

posiciones de las cuales se desconoce el

play07:59

dueño sé libre sé privado y sé

play08:02

ingobernable

play08:04

[Música]

Rate This

5.0 / 5 (0 votes)

Related Tags
Digital PrivacyCybersecuritySurveillanceAnonymityCensorshipEncryptionOnline FreedomData ProtectionPrivacy ToolsCyber Espionage