How to Be Invisible on the Internet. 10 Identifiers to Eliminate

Rob Braxman Tech
21 Feb 202423:47

Summary

TLDREl video destaca 10 identificadores que pueden comprometer la privacidad en línea y ofrece estrategias para ocultarlos. Aborda temas como direcciones IP, números de teléfono, identificadores de hardware, cookies, y más, priorizando cada uno según su nivel de amenaza. Resalta el uso de VPN, navegadores anónimos, y la separación de identidades en diferentes plataformas para proteger la privacidad digital.

Takeaways

  • 🕵️‍♂️ La invisibilidad en Internet implica ocultar tus identificadores para mantener tu privacidad en línea.
  • 🌐 La dirección IP es el identificador más básico y peligroso, debe ser protegida utilizando VPN.
  • 📱 Los números de teléfono han convertido en una forma de identificación en Internet, se recomienda usar un número separado para la autenticación de dos factores.
  • 📱 Los identificadores del teléfono móvil, como el IMEI y el MZ, son importantes pero no visibles para las plataformas a menos que se utilice un OS que los registre.
  • 🖥️ Las direcciones MAC son indirectas y no visibles automáticamente, pero algunas aplicaciones pueden recolectar esta información.
  • 🔢 Los identificadores del hardware y los números de licencia del OS son recolectados por las plataformas y pueden ser enviados a través de aplicaciones.
  • 🎯 Los ID publicitarios son identificadores temporales que se pueden desactivar o cambiar con facilidad.
  • 🍪 Las cookies y los rastreadores de huellas digitales son usados principalmente para publicidad y pueden ser mitigados con un navegador que borre las cookies después de cada sesión.
  • 📍 La trazabilidad de la ubicación es muy peligrosa y puede revelar tu identidad, se debe usar un VPN y desactivar las permisos de ubicación.
  • 🔐 La ID de Google y Meta son las más peligrosas ya que pueden vincularse con otras identificaciones y rastrearte en todo Internet.
  • 📧 Las direcciones de correo electrónico son también identificadoras y se recomienda usar diferentes para cada plataforma.

Q & A

  • ¿Qué significa estar invisible en Internet y cómo se puede lograr?

    -Estando invisible en Internet significa que aún estás conectado y realizando actividades en línea, pero no puedes ser identificado ni rastreado por terceros. Se puede lograr mediante la ocultación o disminución de identificadores que te acompañan en el ciberespacio, como direcciones IP, números de teléfono, identificadores de hardware, cookies, entre otros.

  • ¿Por qué es importante ocultar tu dirección IP en Internet?

    -La dirección IP es un identificador fundamental que acompaña cada petición que realizas en Internet. Si tu dirección IP es visible, es posible que te rastreen o te identifiquen, lo que compromete tu privacidad y seguridad en línea. Usar un VPN (Virtual Private Network) te permite ocultar tu dirección IP real y reemplazarla con la del servidor del VPN, dificultando que otros te rastreen o te identifiquen.

  • ¿Qué es un VPN y cómo funciona para proteger mi identidad en línea?

    -Un VPN, o Red Privada Virtual, es un servicio que cifra tu conexión a Internet y redirige el tráfico a través de un servidor remoto. Al hacer esto, oculta tu dirección IP real y te asigna una nueva, diferente, que corresponde al servidor del VPN. Esto ayuda a proteger tu privacidad, evitando que terceros te rastreen o vean tus actividades en línea.

  • ¿Qué son los identificadores de hardware y por qué pueden ser problemáticos en términos de privacidad?

    -Los identificadores de hardware son números únicos asignados a los dispositivos, como direcciones MAC, números de serie de la CPU y números de licencia de sistemas operativos. Estos identificadores pueden ser recopilados por las plataformas y aplicaciones para rastrear y识别 tus dispositivos, lo que compromete tu privacidad. Para proteger tus identificadores de hardware, se puede utilizar un teléfono Google o una máquina virtual en tu computadora.

  • ¿Qué es la identificación de publicidad y cómo se puede manejar para proteger mi privacidad?

    -La identificación de publicidad es un identificador temporal que se utiliza para segmentar y mostrar anuncios publicitarios personalizados. Estos identificadores son enviados con el tráfico de la aplicación y pueden ser recopilados por las plataformas. Para proteger tu privacidad, puedes optar por no participar en la recolección de identificadores de publicidad o cambiar el identificador de publicidad con frecuencia en las configuraciones de privacidad de tu dispositivo.

  • ¿Qué son las cookies y por qué pueden ser problemáticas en términos de privacidad?

    -Las cookies son pequeños archivos de texto almacenados en tu dispositivo por los sitios web visitados. Estas cookies pueden ser utilizadas para rastrear tus hábitos de navegación y mostrarte anuncios personalizados. Para proteger tu privacidad, puedes utilizar un navegador que automáticamente elimine las cookies después de cada sesión o configurar tus opciones de privacidad para limitar su uso.

  • ¿Qué es el seguimiento de ubicación y por qué es peligroso en términos de privacidad?

    -El seguimiento de ubicación implica la recolección de datos sobre tu ubicación física, que puede ser utilizada para rastrear tus movimientos y conocer tus hábitos. Esto puede ser especialmente peligroso si se combina con tu dirección IP, lo que permite a terceros identificar exactamente quién eres y dónde estás. Para proteger tu privacidad, siempre utiliza un VPN y desactiva las permisos de ubicación en tus aplicaciones y dispositivos.

  • ¿Cómo pueden las identidades de Google y Meta (Facebook) afectar mi privacidad en línea?

    -Las identidades de Google y Meta (Facebook) son cookies y tecnologías de seguimiento que permiten a estas compañías rastrear tus actividades en línea y recopilar datos personales. Cuando estas identidades están asociadas con tus actividades en línea, pueden ser utilizadas para construir un perfil detallado sobre ti. Para proteger tu privacidad, aísla tu uso de Google y Meta en diferentes navegadores y evita compartir tu información personal en estas plataformas.

  • ¿Qué es un teléfono Google y cómo puede ayudarme a proteger mi privacidad?

    -Un teléfono Google es un dispositivo móvil que utiliza un sistema operativo basado en Android Open Source Project (AOSP). Estos teléfonos no tienen una conexión con Google y no acceden a los identificadores de hardware del dispositivo, lo que reduce la cantidad de información que se puede recopilar sobre ti. Utilizar un teléfono Google puede ayudarte a proteger tu privacidad al evitar que Google y otras empresas recopilen tus datos de navegación y otros datos personales.

  • ¿Cómo puedo proteger mi información de contacto, como mi número de teléfono y mi dirección de correo electrónico, en línea?

    -Para proteger tu información de contacto en línea, puedes utilizar números de teléfono y direcciones de correo electrónico diferentes para cada plataforma o servicio en línea. Asegúrate de no compartir estas cuentas en contacto con otras personas y opta por servicios de correo electrónico que no muestren tu información en listas de contactos, como el servicio de correo electrónico bmail.

  • ¿Qué medidas adicionales puedo tomar para aumentar mi privacidad en línea?

    -Además de las medidas mencionadas anteriormente, puedes utilizar navegadores que bloquean anuncios y seguimiento, como el navegador Brave, y evitar el uso de plataformas que son conocidas por recopilar datos de usuario. También es importante mantener actualizado el software de tus dispositivos y utilizar contraseñas seguras y únicas para cada cuenta en línea.

Outlines

00:00

🕵️‍♂️ Identidad Invisible en Internet

Este párrafo aborda la importancia de mantener una identidad anónima en línea. Se discuten los diferentes identificadores que nos acompañan en el internet y las aplicaciones, y se enfoca en cómo ocultar estos 10 identificadores para proteger nuestra privacidad. Se menciona el uso de VPN, la protección de la dirección IP y la importancia de no compartir información personal en línea.

05:03

📱 Protección de Números de Teléfono e IMEI

En este párrafo se discuten los riesgos de compartir números de teléfono y la identificación única del IMEI en dispositivos móviles. Se sugiere la utilización de un número de teléfono separado para la autenticación en dos pasos (2FA) y se explica cómo las grandes empresas de tecnología pueden acceder a nuestra información de contacto y cómo esto puede comprometer nuestra privacidad en línea.

10:05

💻 Protección de la Dirección MAC y de la Hardware

Este párrafo se centra en la protección de la dirección MAC, un identificador único en dispositivos inalámbricos, y en los identificadores de hardware en computadoras. Se discute cómo las aplicaciones pueden recopilar esta información y cómo la solución para proteger esta información es el uso de un teléfono Google con un sistema operativo basado en Android open-source (AOSP).

15:08

🖥️ Identificadores de Hardware y de Sistema Operativo

Este párrafo cubre los identificadores de hardware y los números de licencia del sistema operativo, específicamente en sistemas Windows. Se sugiere el uso de una máquina virtual para proteger esta información y se menciona que cualquier aplicación puede acceder a estos identificadores, lo que representa un riesgo para la privacidad del usuario.

20:09

🎯 Control de Identificadores de Publicidad y de Rastreadores de Cookies

Este párrafo aborda los identificadores de publicidad y los rastreadores de cookies, que se utilizan principalmente para fines publicitarios. Se explica cómo optar por no recibir estas identificaciones y cómo cambiar la identificación de publicidad regularmente puede reducir su impacto en la privacidad. Sin embargo, se señala que estos no son los principales problemas si no están vinculados a una cuenta de Google o Facebook.

🌐 Rastreo de Ubicación y Protección de la Privacidad

Este párrafo enfatiza el peligro del seguimiento de ubicación y cómo, si se permite, puede resultar en la pérdida de privacidad. Se menciona la importancia de utilizar un VPN para proteger la información de ubicación y se sugiere apagar siempre las permisos de ubicación, especialmente al estar en casa.

📧 Uso de Direcciones de Correo Electrónico Distintas para Plataformas

Este párrafo explica cómo el uso de una dirección de correo electrónico única para cada plataforma puede ayudar a proteger la privacidad. Al evitar que las plataformas vinculen la dirección de correo electrónico con otras formas de identificación, se reduce la posibilidad de que se pueda rastrear la actividad en línea del usuario.

🛠️ Herramientas y Soluciones para la Privacidad en Línea

Este párrafo presenta una serie de soluciones y herramientas para mejorar la privacidad en línea, como el uso de teléfonos Google, servicios VPN, la creación de una empresa dedicada a soluciones de privacidad y la promoción de productos como el Brax router y el servicio de correo electrónico Brax mail. Se enfatiza la importancia de comenzar a implementar estas medidas para proteger la privacidad en el futuro.

Mindmap

Keywords

💡Invisibilidad en Internet

La invisibilidad en Internet se refiere a la capacidad de usar los servicios de línea sin que terceros puedan rastrear o identificar la identidad del usuario. En el video, se discute cómo ocultar una serie de identificadores para lograr esta invisibilidad, siendo un tema central para proteger la privacidad en línea.

💡IP Address

La dirección IP es un identificador único asignado a cada dispositivo en una red de computadoras y es esencial para la comunicación en línea. En el video, se destaca su importancia como identificador y cómo el uso de un VPN puede ocultar la dirección IP real de los usuarios, proporcionando un nivel de amenaza de 10.

💡VPN (Virtual Private Network)

Una red privada virtual (VPN) es una tecnología que encripta y protege la conexión de Internet de un usuario, permitiendo el acceso a recursos remotos a través de una conexión segura. En el contexto del video, se utiliza para ocultar la dirección IP y proteger la privacidad en línea, siendo una herramienta fundamental para la invisibilidad en Internet.

💡Identificadores de hardware

Los identificadores de hardware son códigos únicos asignados a los dispositivos que permiten a las empresas de tecnología identificar y rastrear los usuarios. En el video, se mencionan como uno de los componentes clave para la invisibilidad en Internet y se sugiere el uso de dispositivos que no estén conectados a Google para evitar el seguimiento.

💡Cookies y seguimiento del navegador

Las cookies son pequeños archivos almacenados en el navegador que permiten a los sitios web rastrear y guardar información sobre los usuarios. El seguimiento del navegador es una técnica utilizada para identificar y rastrear a los usuarios en diferentes sitios web. En el video, se discute cómo estos pueden comprometer la invisibilidad en Internet y se sugiere el uso de navegadores que borren las cookies automáticamente como solución.

💡Google ID y Meta ID

El Google ID y el Meta ID son identificadores únicos asociados a las cuentas de usuario de Google y meta (Facebook), respectivamente. Estas identidades permiten a estas empresas rastrear y personalizar la experiencia del usuario en sus plataformas. En el video, se considera que estos ID son una amenaza de nivel 10 para la privacidad, ya que pueden ser usados para rastrear y vincular la actividad en línea del usuario.

💡Traza de ubicación

La traza de ubicación se refiere al proceso de monitorear y registrar la ubicación geográfica de un usuario. En el video, se destaca como una amenaza de nivel 9, ya que la combinación de la dirección IP y la ubicación puede revelar la identidad y las hábitos del usuario. Se recomienda el uso de VPN y la desactivación de permisos de ubicación para proteger la privacidad.

💡Email como identificador

El correo electrónico es un identificador común utilizado por las plataformas en línea para vincular y rastrear a los usuarios. En el video, se sugiere que el uso de diferentes direcciones de correo electrónico para cada plataforma y el uso de servicios de correo electrónico que no revelen la identidad pueden ayudar a proteger la privacidad en línea.

💡Publicidad ID

El ID de publicidad es un identificador temporal utilizado por las aplicaciones y los anunciantes para rastrear y personalizar los anuncios en los dispositivos móviles. En el video, se sugiere que optar por no participar en la recopilación de este ID o cambiarlo con frecuencia puede reducir la capacidad de los terceros para rastrear al usuario.

💡Huella digital del navegador

La huella digital del navegador es un conjunto de características únicas del navegador y del dispositivo del usuario que pueden ser utilizadas para rastrear y identificarlo en línea. En el video, se menciona que minimizar la personalización del navegador y el uso de múltiples navegadores puede reducir la huella digital y proteger la privacidad.

💡IMEI y MZ

El IMEI (Número de Identificación del Equipo de Móvil Internacional) y el MZ (marca de identificación de la SIM) son identificadores únicos asociados con los dispositivos móviles. En el video, se abordan como amenazas para la invisibilidad en Internet, especialmente cuando las autoridades gubernamentales pueden utilizar estas identificaciones para rastrear a los usuarios.

💡MAC address

La dirección MAC (Media Access Control) es un identificador único asignado a los dispositivos wireless y es utilizado para la comunicación en las redes locales. En el video, se discute cómo ciertos apps pueden recopilar y utilizar la dirección MAC para rastrear al usuario, siendo una amenaza para la privacidad en línea.

Highlights

The internet is designed to track us, and eliminating identifiers is key to becoming pseudo-anonymous online.

IP addresses are fundamental to internet communication and can be hidden using a VPN.

Phone numbers have become internet IDs and can be used to link multiple accounts to a single individual.

IMEI and SIM card identifiers like MZ can be tracked by governments using devices like Stingray.

MAC addresses, while not automatically visible, can be collected by certain apps for privacy-invasive purposes.

CPU identifiers and OS license numbers can be retrieved by apps and sent to platforms.

Advertising IDs are temporary but often permanent identifiers used for targeted advertising.

Cookie trackers and browser fingerprints are used for advertising but can be minimized by using privacy-focused browsers.

Google ID and Meta ID are high-threat identifiers that can be isolated to specific browsers to prevent tracking.

Location tracking can reveal a person's real name and address if combined with an IP address.

Email addresses used as logins can be connected to contact lists and reveal a user's identity.

The main threat to privacy is the Google ID, which can be mitigated by using a Google Phone and a VPN.

Using different email addresses for each platform can prevent email addresses from being used as identifiers.

The transcript emphasizes the importance of starting to implement privacy measures as soon as possible.

The speaker has started a company to help with private solutions, offering various products like Google Phones, VPN services, and email services.

The speaker's live streams have moved to Rumble and ROBRA.LOCALS.COM, occurring on Thursdays at 8:00 p.m. Pacific Time.

Transcripts

play00:00

how can you be invisible on the internet

play00:03

invisibility means you're still on the

play00:05

internet but no one can see you there

play00:08

the problem will be from certain

play00:09

identifiers that accompany you as you

play00:12

surf the interwebs or use apps in this

play00:16

video I'll discuss 10 of these

play00:19

identifiers what I will explain today is

play00:21

how to hide these 10 identifiers so no

play00:24

one can tell who you are have I caught

play00:27

your interest if so then stay right

play00:32

[Music]

play00:36

there let's start with a basic premise

play00:39

the internet is designed to track US

play00:42

ever since the internet was invented to

play00:45

even send information from one internet

play00:47

node to another required

play00:50

addressing thus we have the IP address

play00:54

IP addresses are often fixed and

play00:57

longterm phones obviously have phone

play00:59

numbers but but they also have the IMEI

play01:02

which is attached to the cell baseband

play01:04

modem phone subscriptions are connected

play01:07

to the imy identifier phone numbers are

play01:10

in databases of contact list that big

play01:13

Tech platforms collect on the network we

play01:16

also have Hardware identifiers each

play01:18

network connection whether to Bluetooth

play01:21

internet cell data all require another

play01:24

identifier called the MAC address this

play01:28

is unique to each device on wireless

play01:31

devices these Mac addresses are even

play01:33

broadcast over the air so listening

play01:36

devices nearby can read them Computing

play01:39

devices have serial numbers built in for

play01:42

example like CPU

play01:44

identifiers operating systems also have

play01:47

license numbers that are unique to your

play01:49

device for example on Windows this is

play01:51

the Windows product ID there are

play01:54

temporary identifiers that are used to

play01:56

Mark devices on phones there is the

play01:59

advertising ID which is an identifier

play02:01

made known to advertises to recognize

play02:03

your device on all browsers platforms

play02:06

can drop a little identifier on your

play02:08

device called a cookie so that websites

play02:11

can track you they can also do a browser

play02:14

fingerprint so they can recognize you if

play02:16

you return every time you log into

play02:19

Google Facebook or Instagram traces of

play02:22

those IDs are visible on most platforms

play02:24

and they can then be used to track you

play02:26

over the

play02:27

Internet another way of identifying you

play02:30

is via location tracking if your

play02:33

location is recorded that is easily

play02:36

transformed into a street address then

play02:39

of course there are plenty of public

play02:41

databases that can convert that to a

play02:44

real name finally you often use an email

play02:46

address to log in to various platforms

play02:49

these email addresses are in contact

play02:51

list as well as records of the platform

play02:54

itself the email address is often a

play02:56

direct identifier by itself fact if you

play03:00

do nothing everything you do on the

play03:03

internet can be attributed to you using

play03:05

some or all of these

play03:08

identifiers your goal if you want to be

play03:11

invisible on the Internet is to

play03:12

eliminate as many of these identifiers

play03:15

from your internet actions this way you

play03:18

become pseudo Anonymous you're there but

play03:21

no one knows who you are exactly let's

play03:24

jump into the 10 identifiers that we

play03:27

will try to remove from your internet

play03:29

action today I will indicate a threat

play03:32

level with each of these from 1 to 10 so

play03:34

you can prioritize which to work on

play03:37

first this list is not sorted by threat

play03:40

levels so watch them all number one IP

play03:43

address Threat Level 10 out of 10 this

play03:48

identifier is the most basic and should

play03:50

be the most feared you cannot go on the

play03:52

internet and do any kind of data

play03:54

exchange without passing an IP address

play03:58

the question is if the the IP address is

play04:01

yours one of the most important

play04:03

techniques for protection is to use a

play04:05

VPN a VPN shows the IP address off the

play04:09

VPN service and not yours this is

play04:13

critical in the home if you're using a

play04:15

Broadband cable modem to supply your

play04:18

internet why is this critical because

play04:21

your IP address at home sticks with you

play04:25

my IP address at my home hasn't changed

play04:28

in 20 years the ISB obviously knows who

play04:31

I am since they send me a bill and send

play04:35

technicians to fix my

play04:37

internet and they have a record of the

play04:39

IP address assigned to me at any given

play04:42

moment any website or app you visit can

play04:45

see this IP address even worse your

play04:48

emails include this IP address if you're

play04:52

using some standard email product and

play04:54

your IP address is sent to the email

play04:56

service provider and it's even in the

play04:59

header of every email you send to others

play05:03

let me alter the threat scenario here

play05:06

sometimes you do not need a VPN

play05:09

currently the Internet only routs

play05:11

traffic using IP addresses in IP V4

play05:15

format version 4 most cell phone

play05:18

carriers and starlink now use the new

play05:21

IPv6 format internally on their Network

play05:26

version six this means that they can not

play05:29

pass an ipv4 address unique to you to

play05:34

any platform watching your traffic you

play05:37

in fact share ipv4 addresses with all

play05:39

the users of the cell service or

play05:42

starlink the IP addresses that appear

play05:45

for your traffic is actually the

play05:47

carrier's ipv4 router that connects to

play05:50

the internet and translates the IPv6

play05:53

address of all of the people on that

play05:58

location this means means that even

play06:00

without a VPN you are invisible already

play06:03

as long as you're not using your own

play06:06

cable modem on your home network this

play06:09

gives you another option to protect your

play06:11

IP address without an additional cost

play06:15

another option is to use tour a tour

play06:18

browser will anonymize your IP address

play06:21

and is the most invisible of all options

play06:24

and it is free however you will find

play06:27

that many sites now reject tour

play06:30

connections because hackers tend to use

play06:33

tour it is also terribly slow so this

play06:36

becomes impractical Beyond occasional

play06:39

use also think about the email using

play06:41

email services that don't show your IP

play06:44

address we for example have a bmail

play06:47

product that does that no IP addresses

play06:50

on the header number two phone numbers

play06:54

Threat Level 8 out of 10 phone numbers

play06:57

have turned into an internet ID

play07:00

especially since most people have mobile

play07:02

phones and every platform knows that

play07:05

what really identifies you is if you go

play07:07

to a platform and you give them your

play07:09

phone number for twoof Factor

play07:12

authentication or

play07:14

2fa obviously this means if you set up

play07:17

multiple accounts let's say in Google

play07:19

then they will know which accounts

play07:20

belong to the same person just from the

play07:23

phone number but this in itself isn't

play07:26

the main identifier phone number

play07:28

directories are known to carriers but

play07:31

are not distributed anymore the main

play07:33

source of phone number directories which

play07:35

reveal your name and potentially your

play07:38

address are actually the contact lists

play07:41

uploaded by your friends you cannot

play07:45

control this and there is a 99% chance

play07:48

that your oldtime phone number is in

play07:51

some contactless database in a big Tech

play07:54

platform they don't have to pay for this

play07:56

and it is uploaded willingly so when

play07:59

when you give a platform your regular

play08:01

phone number for tofa then they can

play08:04

actually verify what your real name is

play08:06

well there goes your invisibility the

play08:09

solution is actually simple have a

play08:12

dedicated phone number for TFA a second

play08:16

phone number you can put it on another

play08:19

phone it will need another sim card you

play08:23

must never give this number out to any

play08:25

contact so it doesn't appear on a

play08:27

contact list the effect is immediate if

play08:30

a platform seeks to identify you your

play08:33

phone number will not match to anyone's

play08:36

contact list you will be invisible your

play08:40

main phone number can be the same your

play08:43

friend can call you on that but never

play08:45

use that main phone number for TFA with

play08:48

one exception that I make and that is

play08:50

for

play08:51

banks number three IMI and MZ Threat

play08:57

Level 9 out of 10

play09:00

your mobile phone has so many

play09:02

identifiers so we'll start with these

play09:04

two the MZ is attached to your sim card

play09:08

when you insert a SIM card your phone

play09:10

will actually broadcast This MC on the

play09:15

airwaves this is a specific threat when

play09:18

dealing with government since they can

play09:19

use a device called Stingray to listen

play09:22

for

play09:24

MZ the other identifier is the IMEI

play09:27

which is permanently attached to your

play09:29

phone Hardware it sticks with you until

play09:32

you change phones but neither of these

play09:34

are the threat to the internet

play09:36

invisibility the reason is that a

play09:38

platform cannot see your IMEI or MZ

play09:41

directly and governments only look at it

play09:44

if they use it on radio interception for

play09:47

example if you go to Tik Tok it cannot

play09:49

find your IMI or MZ the real threat is

play09:53

from the phone OS which is Google

play09:56

Android or Apple iOS these OS can

play09:59

identify your device identifiers and

play10:01

store it on their database so this ruins

play10:04

any plans for invisibility on these

play10:06

devices you cannot hide from the OS of

play10:09

what I call a normie phone the best

play10:12

solution for a phone is to use a the

play10:14

Google Phone this means having a phone

play10:17

with a different OS based on Android

play10:19

open- source project or

play10:22

AOSP these kinds of phones do not have a

play10:25

connection with Google and do not give

play10:28

access

play10:29

to the hardware identifiers this has a

play10:32

high Threat Level because these

play10:34

identifiers are used to track you on all

play10:36

other devices with a technique called

play10:40

cross device tracking number four Mac

play10:44

addresses Threat Level two out of 10 Mac

play10:47

addresses are indirect identifiers this

play10:51

is a common misconception about the

play10:53

seriousness of a MAC address by many

play10:55

people the MAC address is not visible to

play10:57

any platform automatically it is not

play11:00

part of the Internet Protocol however

play11:02

some apps intentionally collect the MAC

play11:05

address and then use this in extremely

play11:08

privacy invasive ways the main culprit

play11:11

here is meta these apps actually spy on

play11:15

the Mac addresses of the local area

play11:17

network these then can be used to verify

play11:20

your

play11:21

identity it is also used to spot you in

play11:25

other environments other Zuck book users

play11:28

can detect your Mac address at a Walmart

play11:30

Wi-Fi for example and then Zach will

play11:33

know you are at Walmart or that you are

play11:36

near other people the other way that Mac

play11:39

addresses are dangerous is through the

play11:41

listening of Bluetooth Mac address

play11:44

broadcast which have been added to iOS

play11:47

and Google Android this was added to

play11:50

these os's to do contact tracing during

play11:53

the covid crisis although I can't be

play11:56

certain they collect this data today the

play11:59

phones have a builtin capability to

play12:02

collect other Bluetooth Mac addresses

play12:04

near it the solution is to use a the

play12:08

Google phone not that this can stop

play12:11

others from listening to your Mac

play12:13

address that will

play12:15

continue however the MAC address will

play12:18

not be connected to you since Google

play12:20

will not know it belongs to you it will

play12:23

just be some random Mac address and

play12:26

again I repeat this a the Google phone

play12:29

has no Google ID so that's why secondly

play12:33

be sure to not use any zaching meta

play12:36

platform since they are the primary

play12:37

users of Mac address tracking number

play12:41

five CPU identifiers and Os license

play12:45

numbers Threat Level two out of 10 let's

play12:49

say you're using

play12:51

Windows this will have a similar problem

play12:53

to the mobile phone using iOS or Google

play12:57

Android it would be be possible for apps

play13:00

to send the CPU identifier or the

play13:02

Microsoft product ID to the platform the

play13:06

problem is that this threat is not

play13:08

limited to a Microsoft any app could

play13:11

retrieve this information on Windows

play13:14

this is available in the Windows

play13:16

registry if a platform requires access

play13:19

only via an executable rather than a

play13:21

browser this should alert you to the

play13:24

possibility that this additional

play13:26

information is retrieved obviously anyos

play13:30

can collect this and send it to HQ but

play13:33

it is more of a threat when it is used

play13:35

with specific knowledge of what you're

play13:38

doing by some app let's say you are

play13:41

required to use an app to access some

play13:43

corporate system then that corporate

play13:45

system could see if you're a valid user

play13:48

by sending the Microsoft product ID from

play13:51

your computer this can then be used to

play13:54

check that the hardware is validated as

play13:56

well the problem is any app could do

play13:59

this the solution is to use a virtual

play14:02

machine on your computer nowadays a

play14:04

virtual machine software is not so slow

play14:07

anymore on Windows and Linux the common

play14:10

free virtual machine software is virtual

play14:13

box from Oracle it is free and the best

play14:17

way is to actually install Linux on the

play14:20

virtual machine virtual machines do not

play14:23

have an actual Hardware identifier for

play14:25

the CPU and by using Linux you eliminate

play14:28

the the risk of the OS identifier being

play14:31

sent number six advertising IDs Threat

play14:35

Level one out of 10 advertising IDs are

play14:40

temporary identifiers used on your

play14:42

devices to attract you now I say

play14:44

temporary but likely 99% of you would

play14:48

keep the same advertising ID for the

play14:50

long term because you will not disable

play14:52

this it's an extra step and many of you

play14:55

don't even know what it is the

play14:56

advertising ID is a volum voluntary

play14:59

identifier that is sent with any traffic

play15:02

and retrieve by apps there's an

play15:04

advertising ID on all operating systems

play15:07

outside of Linux and the Googled os's

play15:11

both mobile and desktop the solution to

play15:14

this is to opt out you can opt out from

play15:18

Google Android Apple iOS Mac OS and

play15:21

windows or if you cannot opt out you can

play15:24

change the advertising ID frequently in

play15:27

some privacy settings

play15:29

the OS can generate a new one this is a

play15:32

threat only from thirdparty platforms by

play15:34

the way and it is not a permanent threat

play15:37

Google and apple can track you via other

play15:39

means if you're using their OS so

play15:43

fortunately this is a threat with a

play15:45

limited scope number seven cookie

play15:48

trackers and browser fingerprints Threat

play15:51

Level two out of 10 cookie trackers and

play15:54

fingerprinting your browser are

play15:56

alternate ways of identifying you for

play15:58

advertising purposes similar to the

play16:01

advertising ID Believe It or Not these

play16:04

are not all that important to your

play16:07

invisibility unless they're connected to

play16:09

your Google ID or some meta ID so let's

play16:13

wait to explain a more detailed solution

play16:17

in the next item absent the Google ID or

play16:21

meta ID these trackers have a very

play16:23

short-term impact they can identify you

play16:26

temporarily but it is not permanent so

play16:28

this is not as important as it would

play16:30

seem at least until a Google ID is

play16:33

matched to it for this reason I don't

play16:35

really do anything special to cookies in

play16:38

general sites will always ask you to

play16:40

accept cookies and I do accept them

play16:43

mostly there are browsers that will

play16:45

automatically delete cookies after each

play16:47

session and that really is the only

play16:50

important solution for example Brave

play16:53

browser will do this automatically clear

play16:56

cookies if you feel this to be a threat

play16:59

in some way browser fingerprinting

play17:02

specifically can be minimized by making

play17:04

your browser as plain vanilla as

play17:06

possible do not use browser extensions

play17:09

and use many browsers as a habit you can

play17:12

even use a different time

play17:14

zone number eight Google ID and meta ID

play17:19

Threat Level 10 out of 10 as I just

play17:23

explained the cookie and browser

play17:24

fingerprint problem isn't that serious

play17:27

until you add the Google ID into the

play17:30

equation I'll add meta in here later the

play17:33

specific threat comes from the Google ID

play17:36

being stored in a cookie when you are

play17:38

logged into Google on a browser this

play17:41

Google ID will be in a cookie for sure

play17:44

the effect of this is that any website

play17:46

with Google analytics Google AdSense

play17:49

will automatically detect this Google ID

play17:52

since the majority of all websites have

play17:54

Google analytics or AdSense then it is

play17:57

safe to say that Google will know

play17:58

practically every website you visit and

play18:01

it will be specifically attributed to

play18:04

your Google ID meta has their own

play18:07

equivalent like the Facebook like button

play18:09

which will capture your IDs from meta

play18:12

properties like Facebook WhatsApp and

play18:15

Instagram the solution is to isolate

play18:18

these to a separate browser only use

play18:20

Google on One browser if you're logged

play18:23

in for example Chrome but do not go to

play18:28

any other website on Chrome do it from

play18:31

another browser this way the Google ID

play18:34

or any meta ID will not leak anywhere

play18:38

you can go to Google on another browser

play18:41

as long as you never log in to Google on

play18:45

that browser I hesitate to give a

play18:47

solution for meta because of the MAC

play18:50

address tracking I mentioned earlier

play18:51

among other things they also do facial

play18:53

recognition the best solution is to

play18:55

abstain from meta number nine n location

play18:59

tracking Threat Level 9 out of 10 the

play19:03

risk of location tracking is that if you

play19:05

are Cavalier about this piece of data

play19:07

and don't turn off location permissions

play19:09

on everything at some point some third

play19:12

party will capture your location

play19:13

information with your IP address this is

play19:18

a frequently sold piece of information

play19:20

by thousands of apps and unfortunately

play19:24

once your IP address is recorded with

play19:26

the location then anyone can do a lookup

play19:29

and find out exactly who you are just by

play19:32

looking at your IP address either as

play19:35

capture by an app a website or through

play19:38

your email the result will be that you

play19:40

will be in a lookup database sorted by

play19:43

IP address and from there it will show

play19:46

your location there are many suppliers

play19:49

of this data including companies like

play19:52

here.com and Skyhook Wireless the

play19:55

solution is to always use a VPN because

play19:58

the location information if accidentally

play20:01

captured is a value only it's a data

play20:03

pair with your IP

play20:06

address and of course always turn off

play20:09

location permissions especially if

play20:11

you're at home you can never be sure

play20:14

which apps are selling your location and

play20:17

IP address data one of the most

play20:19

well-known apps that do this is the

play20:21

weather channel app which is owned by

play20:24

IBM the other fear with location

play20:27

tracking is that Google and apple always

play20:30

know where you are 247 your location

play20:33

data is then used to provide Geo fencing

play20:35

services to government agencies if

play20:38

you're using a d Google phone then you

play20:40

are safe from this number 10 email

play20:43

address used as login Threat Level 6 out

play20:47

of 10 if you use a specific email

play20:50

address to log to a platform then the

play20:52

platform can check the same contact list

play20:54

where they find your phone number to

play20:56

also see your real name

play20:58

so in essence the phone number and email

play21:01

are connected identifiers the solution

play21:03

here is to use different email addresses

play21:05

for each platform some email products

play21:07

can allow an ilas like

play21:10

bmail this ensures that your email will

play21:13

not be found in any contact list since

play21:16

you will not give this alas email to

play21:19

your contacts so there you are 10

play21:22

identifiers that you must attempt to

play21:24

hide from the internet at all times use

play21:28

the Threat Level to gauge the importance

play21:30

of these to your privacy actions

play21:33

unfortunately know that you cannot

play21:35

delete data that is already known on the

play21:38

internet you can only move forward to

play21:40

eliminate future data keep that in mind

play21:43

the sooner you start implementing these

play21:45

actable items the better for your

play21:47

privacy good luck privacy is something

play21:50

we all have to work on it does not come

play21:52

to us automatically I try to make it

play21:54

easier by starting a company to help the

play21:56

average person with private Solutions

play21:59

the main threat currently is the Google

play22:01

ID which is on your phone there are

play22:03

hidden Communications between common

play22:05

phones and big Tech which reveal device

play22:09

identifiers and 24/7 location tracking

play22:13

that points to you we sell various

play22:15

models of the Google phones in our store

play22:17

these phones are around $400 so they are

play22:20

cheaper than normal phones we have the

play22:23

bytes VPN service which I started a few

play22:25

years ago as I discussed in this video a

play22:28

VPN is important to hiding your IP

play22:31

address our VPN service is unique

play22:33

because it includes ad blocking via a py

play22:36

hole server which also serves to

play22:38

anonymize your DNS we have a related

play22:41

Brax router product that can allow you

play22:44

to VPN your entire home internet traffic

play22:47

this keeps everything simple if you have

play22:50

many devices we have a Brax mail service

play22:53

that hides identity information from

play22:55

your email and prevents you from showing

play22:58

up on contact lists it also eliminates

play23:01

IP addresses from showing up on the

play23:03

header or in logs we offer unlimited

play23:06

aases seven domains and web mail check

play23:10

that out for $50 a year all these are on

play23:13

my store on bra. May sign up on there

play23:17

and you will not be asked for personal

play23:19

information like email I also want to

play23:22

remind you that I've moved my live

play23:25

streams to rumble and robra . locals.com

play23:29

these live streams are on Thursdays 8:00

play23:32

p.m. Pacific Time join me there if you

play23:35

want to ask questions live thank you for

play23:38

watching and see you again next

play23:41

[Music]

play23:45

time

Rate This

5.0 / 5 (0 votes)

Related Tags
Privacidad en líneaNavegación anónimaSeguridad de InternetVPNCookiesRastreabilidadIMEIMAC地址Email anónimoBig Tech
Do you need a summary in English?