REVEALED! Your Secret Power Over Google

Rob Braxman Tech
31 Jan 202419:03

Summary

TLDRThe video discusses the pervasive tracking by tech giants like Google and emphasizes the importance of understanding their mechanisms to overcome privacy challenges. The narrator, a deep-level technologist, explains that the key to privacy lies in evading attribution, preventing personal identity from being linked to online activities. Strategies to protect privacy include using different browsers and devices, and employing tools like VPNs and email services that obscure identity and traffic. The video also promotes the use of a dGoogle phone, a device without Google login, to significantly reduce tracking.

Takeaways

  • 📚 The speaker reads and responds to comments, learning about viewers' concerns regarding online privacy and Google's tracking practices.
  • 😨 The audience's common reaction to the previous video was shock and despair about Google's tracking, with some suggesting extreme measures like quitting the internet.
  • 🛡️ The speaker aims to educate viewers on how to understand and overcome privacy challenges posed by tech giants like Google, rather than succumbing to fear or helplessness.
  • 🤔 The speaker emphasizes the importance of knowing the threats to privacy in detail to effectively problem-solve and protect oneself online.
  • 🔍 Google's business model relies on tracking users, and the speaker identifies 'Normie' behavior as being susceptible to such tracking (being 'zucked').
  • 💡 The key to beating Google's tracking is understanding its foundation and exploiting its weaknesses, as the speaker, a deep-level technologist, explains.
  • 🎯 The central concept is 'attribution' – the process of linking internet actions to a specific identity, which is the core of privacy concerns.
  • 🔐 The speaker argues that data without identity attached has little value, and the goal should be to prevent Google from associating data with one's identity.
  • 📱 The speaker discusses various scenarios involving different levels of exposure to Google tracking, from using Google services logged in to using non-Google devices and services.
  • 🚫 The speaker advises against relying solely on Google's platforms and services, suggesting alternative methods and technologies to enhance privacy.
  • 🛒 The speaker promotes his company's solutions for privacy, including a dGoogle phone, VPN services, and email services, as tools to mitigate tracking and protect identity.

Q & A

  • What was the common reaction to the speaker's last video on Google tracking?

    -The common reaction was that most viewers felt mortified and some even suggested leaving the internet, stopping the use of smartphones, and social media due to a sense of hopelessness regarding privacy.

  • What is the speaker's stance on using Google and privacy challenges?

    -The speaker acknowledges using Google but emphasizes that understanding the underlying mechanisms of how Google works allows us to overcome privacy challenges. The speaker believes in revealing these mechanisms to help users protect their privacy.

  • What does the speaker consider as the main threat to privacy?

    -The speaker considers the Google ID as the main threat to privacy because it allows Google to collect and attribute data to a specific individual, enabling manipulation and potential privacy invasions.

  • What is the concept of 'attribution' in the context of the video?

    -Attribution refers to the process of assigning an internet action to a real person's identity. It is a key concern for privacy as it links individual actions to a specific identity, allowing companies like Google to build profiles and potentially manipulate users.

  • How does the speaker suggest improving privacy online?

    -The speaker suggests improving privacy by understanding and exploiting the weaknesses of Google's systems. This includes avoiding the association of online activities with one's Google ID and being mindful of the identity attached to the data collected.

  • What are the two primary methods of tracking mentioned in the video?

    -The two primary methods of tracking mentioned are deterministic tracking, which involves attributing actions to a specific Google ID, and probabilistic tracking, which is based on guesses and short-term data that may or may not be linked to an identity.

  • What is the speaker's advice for dealing with probabilistic tracking?

    -The speaker advises that probabilistic tracking can be less of a concern if it cannot be linked to a specific identity. They suggest feeding the system misleading information or engaging in activities that do not reveal one's true interests to disrupt profiling attempts.

  • How does the speaker describe the use of a Google phone in relation to privacy?

    -The speaker describes a Google phone, especially one used for limited purposes like 2FA only, as a device that can be managed to minimize privacy risks. They recommend turning the device off most of the time and not using any apps on it to reduce the data available for collection.

  • What solutions does the speaker offer for enhancing privacy?

    -The speaker offers solutions such as using a dGoogle phone (a phone without Google services), a VPN service to hide IP addresses, a secure email service to hide identity information, and the use of various browsers and devices to segment online activities and protect privacy.

  • Where can viewers find the speaker's products and services?

    -Viewers can find the speaker's products and services on brax.me, where they offer a range of privacy-focused solutions including dGoogle phones, VPN services, and secure email services.

  • How does the speaker address the issue of manipulation through personal data collection?

    -The speaker emphasizes that the goal is to prevent Google or other platforms from creating an accurate profile of who you are. By being smart about how you partition your online activities and ensuring that your identity is not easily attributable to your data, you can reduce the ability of these platforms to manipulate you.

Outlines

00:00

🧐 Understanding Google's Tracking and Privacy Concerns

The paragraph discusses the audience's reaction to a previous video on how Google tracks user activity. It highlights the common sentiment of concern and helplessness, with suggestions to abandon the internet and smartphones. The speaker clarifies that they use Google and other platforms but emphasizes the importance of understanding the mechanisms of tracking to overcome privacy challenges. The speaker, a deep-level technologist, asserts that by knowing Google's weaknesses, one can maintain privacy while using their services.

05:02

🔍 The Importance of Attribution in Privacy

This section delves into the concept of attribution, explaining its significance in privacy. It distinguishes between security and social media contexts, emphasizing the need to link internet actions to a specific identity for data to be valuable. The speaker argues that without identity attachment, Google's data collection is harmless. The crux of the privacy issue lies in Google linking actions to individual identities, which the speaker advises to avoid. The focus should be on preventing the association of data with one's identity.

10:02

🛡️ Strategies for Protecting Identity from Google

The speaker presents various scenarios to illustrate how Google tracks users based on their Google ID and other identifiers. It discusses deterministic and probabilistic tracking methods and suggests strategies to limit Google's ability to collect data attached to one's identity. Techniques include using different browsers for different activities, feeding Google incorrect information, and limiting activities on devices that can be tracked back to the user. The speaker also mentions using a special phone without Google services for enhanced privacy.

15:04

💡 Privacy Solutions and Resources

In the final paragraph, the speaker offers solutions to enhance privacy, including the use of a non-Google phone and VPN services. They promote their company's offerings, such as a dGoogle phone, VPN, and email service, designed to protect user privacy by eliminating tracking and preventing identity disclosure. The speaker encourages viewers to think strategically about their online activities and to use the knowledge shared to safeguard their privacy. They also inform about their live streams on alternative platforms and how to sign up without providing personal information.

Mindmap

Keywords

💡Google

Google is a technology company that specializes in Internet-related services and products, as mentioned in the video. It is used as a prime example of a company that tracks user data extensively. The video discusses how Google collects data on users' online activities, such as search queries, to build profiles and serve targeted advertisements. The main concern is about privacy and the potential misuse of personal information.

💡Privacy

Privacy refers to the state or condition of being free from being observed or disturbed by other people. In the context of the video, it is a central theme as the speaker discusses the importance of protecting one's personal information from entities like Google. The video emphasizes the need to understand the mechanisms used by tech companies to collect data in order to safeguard one's privacy.

💡Tracking

Tracking, in the context of the internet, refers to the practice of monitoring and recording a user's online activities, such as the websites they visit and the searches they conduct. The video highlights how companies like Google use tracking to gather data on users, which can lead to privacy concerns. The speaker provides insights on how this tracking works and offers strategies to limit its impact on personal privacy.

💡Normie

In the context of the video, 'normie' is a term used to describe an average or typical internet user who may not be aware of or take steps to protect their online privacy. The speaker uses this term to illustrate the target demographic of Google's tracking model, emphasizing that those who do not take measures to protect their privacy will be more susceptible to being 'zucked' or having their data exploited.

💡Attribution

Attribution, in the context of the video, refers to the process of linking specific actions or behaviors to a particular individual's identity. The speaker argues that the real threat to privacy lies in the ability of entities like Google to attribute online actions to a specific person, as this allows for the creation of detailed profiles that can be used for targeted advertising or other purposes. The video emphasizes the importance of evading attribution as a key strategy for maintaining privacy.

💡Deep Level Technologist

A deep level technologist, as described in the video, is someone with a profound understanding of technology and its inner workings. The speaker identifies themselves as such, indicating that they have a deep knowledge of how tech companies like Google operate and how their systems can be manipulated or overcome. This expertise allows the speaker to provide informed advice on how users can protect their privacy from intrusive tracking practices.

💡Achilles Heel

In the context of the video, the term 'Achilles Heel' is used metaphorically to describe a vulnerability or weakness in a system. The speaker uses this term to refer to the weak point in Google's infrastructure, suggesting that understanding and exploiting this weakness can help users protect their privacy. The video emphasizes that by understanding the limitations of Google's tracking capabilities, users can gain an advantage.

💡Evading Attribution

Evading attribution, as discussed in the video, is the practice of avoiding having one's online actions linked to their real-world identity. The speaker argues that this is crucial for maintaining privacy, as it prevents companies from building detailed profiles of users. The video provides strategies for evading attribution, such as using different devices and browsers to compartmentalize online activities, and avoiding logging into Google services.

💡Google ID

A Google ID is a user account associated with Google's suite of services. In the video, the speaker identifies the Google ID as a significant factor in tracking, as it allows Google to attribute various online activities to a specific user. The video discusses the importance of limiting Google's access to one's Google ID to enhance privacy and suggests using devices and services that do not require a Google login as a solution.

💡Data Identity

The term 'data identity' in the video refers to the combination of data collected with the identity to which it is linked. The speaker argues that while data on its own may not pose a significant privacy risk, the danger arises when this data can be attributed to a specific individual. The video emphasizes the importance of separating data from identity to maintain privacy and suggests strategies for doing so.

💡Probabilistic Tracking

Probabilistic tracking is a method of tracking users based on probabilities and patterns rather than definitive identification. Unlike deterministic tracking, which relies on direct association with a user's identity, probabilistic tracking makes educated guesses based on user behavior. The video explains that this type of tracking is less accurate and has a limited long-term value if it cannot be linked to a specific identity.

💡Disinformation

Disinformation refers to false or misleading information that is spread deliberately to deceive or manipulate. In the context of the video, the speaker mentions the prevalence of disinformation on the internet, particularly with regards to privacy and technology. The speaker emphasizes the importance of understanding the real threats to privacy and not being misled by incorrect information or solutions.

Highlights

The common reaction to the last video on how Google tracks every click was that it mortified most viewers.

Many comments suggested leaving the internet, stopping smartphone use, and giving up on social media due to privacy concerns.

The speaker uses other platforms beyond YouTube and has around 140,000 followers on them.

Understanding the tech mechanisms used by Google is essential to overcome privacy challenges.

Google's model is based on tracking the 'normie' user, and deviating from this behavior can help protect privacy.

The speaker is a deep-level technologist and aims to teach the audience how to beat Google's technology.

The importance of understanding the real threats to privacy is emphasized over simple solutions.

Evading attribution is the key to privacy; without it, data has no value.

Google's infrastructure has an Achilles heel, which is its reliance on attributing data to specific identities.

The speaker is not afraid of Google tracking their activities, as they understand the nature of internet data collection.

Google's primary way of collecting information is through a logged-in Google ID.

Different tracking methods are explained, including deterministic and probabilistic tracking.

Scenarios are provided to understand how different actions affect privacy in relation to a Google ID.

Using a phone with a Google login allows Google to verify device identifiers and perform deterministic tracking.

The speaker recommends using a dGoogle phone, which has no Google login or hidden communications with Google.

A VPN service is offered to hide IP addresses and provide encryption against man-in-the-middle attacks.

The speaker's live streams have moved to Rumble and Rooster Ban Locals, airing on Thursdays at 8:00 p.m. Pacific Time.

Transcripts

play00:00

as many of you regulars already know I

play00:03

read all your comments and respond to

play00:05

almost all of them if there's a question

play00:08

and I learned a lot about what you're

play00:10

all thinking just from these comments

play00:13

this is what I learned from reading

play00:15

these on the last video the common

play00:18

reaction to my last video on how Google

play00:20

Tracks every single click was just that

play00:25

it mortified most of you and I saw so

play00:28

many comments about just leave the

play00:30

internet just stop using smartphones

play00:34

stop using social media we're doomed and

play00:38

so on I did get into potential Solutions

play00:41

later on but maybe these people just

play00:43

tuned out by then by all the perceived

play00:46

negativity and hopelessness let's be

play00:49

clear I obviously use Google I'm here on

play00:54

YouTube though it is incorrect to say

play00:56

I'm just tied to YouTube I have as of

play00:58

right now around

play01:00

140,000 followers on other platforms and

play01:02

some of you are watching me on those

play01:04

other platforms but I'm not afraid of

play01:07

Google the purpose of these videos is to

play01:10

reveal the tech mechanisms used so we

play01:13

can overcome them if we can't overcome

play01:16

these privacy challenges then I need to

play01:18

pack up and give up but fortunately we

play01:21

have

play01:22

Solutions Google's model is based on

play01:25

tracking the

play01:26

Normie if you behave like a normie then

play01:30

you will be zucked and things will be

play01:32

pretty much hopeless for you privacy

play01:34

wise but if you actually understand the

play01:36

foundation of how Google works then you

play01:39

can beat their technology I understand

play01:43

this because I'm a deep level

play01:45

technologist the reality is that we can

play01:48

coexist with Google in this tracking

play01:50

infested Tech if you know the weaknesses

play01:54

of their systems in this video I will

play01:57

teach you real limitations to what

play01:58

Google can do and this can then be used

play02:01

to our advantage to control what Google

play02:03

knows about us stay right

play02:08

[Music]

play02:12

there one person said in a comments that

play02:15

he has no time for long explanations

play02:17

about the why of things just tell him

play02:20

the

play02:21

solution that's not my style folks I

play02:25

have realized that I cannot teach you

play02:27

properly unless I tell you what the

play02:30

actual threats are to your privacy very

play02:34

specifically may not be exciting for the

play02:36

nonis but it's been the unique style of

play02:39

this channel since day one and the

play02:43

purpose of teaching you in detail is to

play02:45

arm yourselves with the knowledge to

play02:49

problem solve things

play02:51

yourself there's so much disinformation

play02:53

on this topic on the internet and I have

play02:56

so many enemies likely techies who work

play02:58

for the same tech companies or corporate

play03:01

cyber security people with completely

play03:03

different motives than I have in general

play03:06

I find that some techies arrive at

play03:09

incorrect Solutions because they didn't

play03:12

truly understand the real threat let's

play03:15

go back to Google specifically and tell

play03:17

you what the Achilles heel is of the

play03:19

Google

play03:20

infrastructure now don't just jump out

play03:22

of this video after I explain what this

play03:25

ailles heel is because it is not a

play03:28

simple thing to overcome this it

play03:30

requires some really careful thinking

play03:32

and understanding of solutions that can

play03:34

work the reality is that I'm personally

play03:37

not afraid of my activities being

play03:40

tracked by Google in fact I know that my

play03:43

actions on the internet are constantly

play03:46

collected and recorded it is a waste of

play03:49

effort to close the internet barn doors

play03:52

after the horses are already out the

play03:56

fact of the matter is that on the

play03:58

internet this is is pretty much

play04:00

impossible since every action is

play04:02

recorded by somebody whether it be

play04:04

Google Facebook or a government but this

play04:08

doesn't worry me I'm not spending

play04:10

sleepless nights fretting over this in

play04:13

fact you should all know that hackers

play04:14

are very active all over the Internet

play04:17

they don't worry much either they are

play04:20

busy disrupting these corporate behs and

play04:23

obviously their actions are being

play04:25

tracked so this sounds all completely in

play04:28

congruous right

play04:30

I want you to learn something about

play04:31

these hackers especially the state level

play04:34

players who really know what they're

play04:36

doing meaning government sponsored

play04:40

hackers the name of the game is evading

play04:45

attribution let me repeat that so it

play04:47

sticks in your head

play04:50

attribution a very important word it is

play04:53

actually the Pinnacle of all my

play04:54

Solutions on privacy again the task is

play04:57

to evade attrib attribution attribution

play05:01

in a hacking context is when the

play05:03

security researchers look for signs and

play05:05

patterns in an attack and determine that

play05:08

the attacker is actually some specific

play05:11

person or some specific government in a

play05:15

social media context attribution really

play05:17

means to assign some internet action to

play05:19

a real person's identity okay I Chang

play05:22

words on you I started off with some

play05:24

vague word called attribution and now

play05:26

I've introduced a new word which is I

play05:29

identity and this is really what the

play05:32

average person needs to concern himself

play05:34

about I have to repeat this several

play05:36

times for this to syn in everything you

play05:39

do on the Internet is trct there is no

play05:41

question about this this is how the

play05:43

internet works just accept this but this

play05:47

information about internet actions has

play05:49

no value if the data cannot be

play05:52

attributed to a specific identity in

play05:55

other words the tracking party Google in

play05:58

this case has to know who did the action

play06:01

otherwise their computer systems don't

play06:03

know where to file these pieces of

play06:06

information I'll give you a specific

play06:08

example if you go to the internet and

play06:10

search for certain diseases and how

play06:12

these can be treated Google knows that

play06:15

and certainly he can give you account of

play06:17

how many people searched about

play06:19

pancreatic cancer or hypertension or

play06:23

heart failure and so on but the danger

play06:26

to privacy is when Google knows that Joe

play06:30

searched for pancreatic cancer Leticia

play06:33

searched for hypertension and Jerry

play06:35

searched for heart failure without an

play06:38

identity attached to the activity Google

play06:40

cannot hurt you Google can affect Joe

play06:44

letia and Jerry here because it'd knows

play06:47

something very specific about them that

play06:50

is the Crux of the Privacy problem don't

play06:53

focus on the collection of data Focus

play06:56

instead on the identity attached to that

play06:59

data or at least think of it as a pair

play07:02

data identity you can have data with no

play07:06

Identity or identity with no data either

play07:09

way it works I've tried to explain this

play07:11

in many videos and I've had to restate

play07:13

this in a different way every year now

play07:16

from here it gets more complex We Now

play07:19

understand that Google's Achilles heal

play07:22

is that for data to be valuable there

play07:23

must be some identity attached to it

play07:26

many of you will leave the video now

play07:27

because you figured it out you will come

play07:29

up with some half big idea on how to

play07:32

hide your identity from Google and

play07:33

you're good to go but that is also the

play07:36

problem Google is very smart about

play07:38

finding your identity and so we have to

play07:40

be equally Smart in overcoming that it's

play07:43

not

play07:45

simple this is why you need to pay

play07:47

attention to the details this is also

play07:50

constantly evolving a few years ago

play07:52

Google was using different techniques

play07:54

than it is using

play07:56

today by the way I just want to make it

play07:58

clear that each of you individually

play08:01

isn't important to Google I'm not

play08:03

important to Google this is why I'm not

play08:05

afraid of Google Google has a global

play08:09

view of the data landscape if they're

play08:12

able to collect information about the

play08:13

internet actions in 90% of the cases

play08:16

using whatever techniques they have then

play08:21

they're good to go as long as there are

play08:22

enough

play08:24

normies they have the ability to make

play08:26

tons of money on that they can fund

play08:29

their Google search Gmail Google Drive

play08:32

YouTube with ads so it is a wasted

play08:35

effort to view this as some personal

play08:37

attack their computer systems will not

play08:40

waste time on use specifically now the

play08:43

government might if you're some targeted

play08:45

individual but the reality is that

play08:47

Google is bent on profiting from Normie

play08:50

Behavior meaning they are there to take

play08:53

advantage of the normi with nothing to

play08:56

hide the rest of us they won't bother

play08:59

and historically this has been the case

play09:01

let's get specific now the primary way

play09:04

Google collects information about

play09:06

individuals is via your logged in Google

play09:09

ID I specifically discussed it in my

play09:12

last video as deterministic tracking

play09:16

they can attribute all your actions on

play09:19

the internet if they know your Google ID

play09:23

please watch that video If you haven't

play09:24

so far so you have the theoretical

play09:26

framework to understand more of what I'm

play09:28

saying here all other methods of

play09:31

tracking such as IP address location Mac

play09:34

address IMEI and so on which many of you

play09:37

fear is called probabilistic tracking

play09:40

this is tracking based on a guess of

play09:43

attribution probabilistic is not exact

play09:46

so its long-term value is uncertain but

play09:49

if they can keep records of your

play09:51

activities in the short term you will

play09:53

likely make a mistake and Reveal Your

play09:56

Google ID and then the the probabilistic

play10:00

tracking becomes

play10:02

deterministic meaning they can then

play10:04

associate a whole slew of activities to

play10:07

your real

play10:09

identity but if they can't do that then

play10:11

that probabilistic data just Fades away

play10:14

it has no long-term value if it cannot

play10:17

be filed away under the data of a

play10:20

specific individual so given this

play10:23

understanding if you're still with me

play10:25

here the general guide to a solution to

play10:29

privacy is to withhold the Google ID as

play10:32

much as possible from Google I'm going

play10:36

to give you VAR scenarios so you can

play10:38

understand the concept here scenario

play10:41

number one Chrome logged in you're on

play10:45

Chrome logged into Google you use

play10:47

YouTube Google search and Gmail scenario

play10:51

number two Brave not logged in you're

play10:54

brave and you're not logged into Google

play10:58

you use YouTube and Google search you

play11:01

cannot use Gmail since you're not logged

play11:04

in scenario number three nor me phone

play11:07

logged in you're on a standard phone and

play11:11

the phone is logged into Google scenario

play11:14

number four the Google phone no login

play11:17

you're on a special phone called a the

play11:20

Google

play11:24

phone here it is clear that Google's

play11:27

watching you on all the Google platforms

play11:29

you are using Google search Gmail

play11:31

YouTube Google Drive and so on all your

play11:33

actions are associated with your Google

play11:36

ID think about this what if you never go

play11:40

to a non-google site on this browser

play11:43

well what happens is that there's no

play11:45

tracking history accumulated for

play11:47

non-google

play11:49

sites also because you know someone is

play11:51

watching you can feed the machine

play11:53

information you want this is an advanced

play11:57

Technique One want to search for

play11:59

contrary content and you will have

play12:01

Google classify you incorrectly this for

play12:04

example could be opposite day with

play12:06

regards to politics religion gender and

play12:08

so on this AI is very vulnerable to this

play12:13

next what if you limited your activity

play12:15

on this browser to nonsense maybe this

play12:19

is only for watching dog videos and

play12:22

bathroom repair things of no importance

play12:25

for profiling a

play12:27

belief then expect that Google does not

play12:31

know what you believe

play12:38

in now here's a completely different

play12:41

environment no Google ID so nothing you

play12:44

do will ever be associated with your

play12:47

identity you can watch anything search

play12:49

for anything have any kind of opinion

play12:52

while some tracking will occur it will

play12:54

only be probabilistic tracking and short

play12:57

term it will not be a long long-term

play12:59

history you can improve your privacy

play13:02

here by not using Google search but even

play13:04

if you did the effect is not

play13:11

permanent now this is the most dangerous

play13:14

device actually because not only are you

play13:17

logged in but the OS can actually verify

play13:19

the device identifiers this is something

play13:22

you need to understand and is one of the

play13:23

newer techniques Google uses so phones

play13:26

are a particularly difficult risk

play13:28

because if you log in once then the IMEI

play13:31

of the device is associated with your

play13:34

Google ID and it doesn't matter if you

play13:36

log out it is always a deterministic

play13:39

tracking method but I mentioned this in

play13:42

my other videos I actually have a

play13:44

standard Google Android I use it for 2fa

play13:46

only and it is off 99.9% of the time I

play13:50

turn it on maybe four times a year what

play13:53

does Google know about this particular

play13:54

device then I don't use any apps on it

play13:57

it is mostly off so here if I can't get

play14:01

rid of the identity I solve it by

play14:04

removing that data when not in use there

play14:07

is no data to

play14:12

capture now this is a special case based

play14:15

on technical details I explained in

play14:17

other videos a phone running Android

play14:21

open- source project or aosb has no

play14:24

Google code in it at all this phone does

play14:27

not log in to Google ever and there is

play14:30

no Google ID nor any software that talks

play14:32

to Google in the background this is

play14:35

basically like the case of Brave browser

play14:37

in scenario number two you can do

play14:39

anything you want since it will never be

play14:41

associated with your Google ID it is

play14:44

basically untrackable to Google Google

play14:47

also cannot see the IMI and other

play14:50

identifiers there are technical

play14:52

explanations to why this is the case

play14:55

Google can perform short-term tracking

play14:58

using probabilistic methods but no

play15:00

long-term way to keep that data and

play15:04

assign it to an identity now each of

play15:06

these scenarios has little gotas and

play15:09

some Advanced complications but again

play15:11

the most important thing is if there is

play15:13

any way to record your activity for the

play15:17

long term you can be in all these four

play15:19

scenarios simultaneously as long as you

play15:22

know you're being watched in scenario

play15:24

number one and scenario number three is

play15:27

that a problem it depends on what you're

play15:30

doing in these

play15:32

scenarios a smart privacy oriented

play15:34

person will use this knowledge to

play15:36

partition what they do the main threat

play15:39

is not to have a Google or other Big T

play15:41

platform get a profile on who you are

play15:44

exactly using a planned collection of

play15:47

devices and browsers you can Define what

play15:50

is known about you the less they know

play15:52

about what you're thinking the less

play15:54

they're able to manipulate you by

play15:56

changing your search content or B

play15:58

basically changing your internet in the

play16:01

end it's all about influencing you

play16:04

either to get you to buy stuff or to

play16:06

make you believe certain things which

play16:08

may or may not be

play16:10

true if you're smart you start thinking

play16:13

about how to confuse the

play16:15

machine when the machine is confused it

play16:18

cannot act against you don't worry about

play16:21

fine details look at the big picture

play16:24

forget that you're being tracked

play16:26

everywhere just always be aware if they

play16:29

know who you really are now my many

play16:33

videos will go into many details about

play16:35

many other little things but basically

play16:39

understanding what I say here is perhaps

play16:41

80% off the battle if you want something

play16:44

for me to focus on just let me know in

play16:47

the comments thank

play16:50

you there are privacy Solutions and

play16:53

that's why I started a company to help

play16:55

the average person to do this more

play16:57

easily

play16:59

as I said in the video the main threat

play17:01

is the Google ID which is on the phone

play17:05

and the solution to that is to have a d

play17:08

Google phone which is a phone without a

play17:11

Google

play17:12

login it is also a phone that has no

play17:15

hidden Communications with Google that

play17:18

can reveal device identifiers or

play17:21

locations this can knock out a

play17:23

significant portion of the tracking we

play17:25

sell various models of the Google phones

play17:27

in our store

play17:28

these phones are around

play17:30

$400 so they are cheaper than normal

play17:34

phones we have the btes VPN service

play17:37

which I started a few years ago the

play17:39

purpose of a VPN service is to hide your

play17:42

IP address secondarily it provides

play17:45

encryption to hide your traffic from

play17:47

anyone listening this protects against

play17:51

man-in-the-middle attacks especially

play17:54

caused by governments and corporations

play17:57

RV PPN service has worldwide coverage

play18:00

and is provided by an entity known to

play18:02

you me hopefully someone you can trust

play18:07

we have a bmail service that hides

play18:09

identity information from your email and

play18:12

prevents you from showing up on contact

play18:14

list it also eliminates IP addresses

play18:17

from showing up in the header or in logs

play18:20

we offer unlimited aliases seven domains

play18:23

and a web mail check that out for $50 a

play18:26

year all these are on my store on

play18:29

brax.me sign up on there and you will

play18:32

not be asked for any personal

play18:33

information to sign up like email I also

play18:37

want to remind you that I've moved my

play18:39

live streams to rumble and Rob

play18:42

ban. locals.com these live streams are

play18:46

on Thursdays 8:00 p.m. Pacific Time join

play18:50

me there if you want to ask questions

play18:52

live thank you for watching and I'll see

play18:55

you again next

play18:57

time

Rate This

5.0 / 5 (0 votes)

Related Tags
Online PrivacyGoogle TrackingData ProtectionTech GiantsPrivacy SolutionsInternet SecurityDigital FootprintCybersecurityAnonymous BrowsingData Attribution