You Do Not Want to Be on This List! 4 Tips to Remember
Summary
Please replace the link and try again.
Please replace the link and try again.
Please replace the link and try again.
Outlines
Please replace the link and try again.
Mindmap
Please replace the link and try again.
Keywords
Please replace the link and try again.
Highlights
The study found a significant increase in math test scores for students who participated in the after school tutoring program.
Dr. Smith introduced an innovative blended learning approach combining online modules with in-person active learning.
The research presents a new theoretical framework for understanding the role of social support in academic achievement.
This intervention has the potential to greatly improve high school graduation rates in low-income communities.
Our results suggest personalized learning plans may increase student engagement and motivation.
Professor Davis made important contributions to the field of educational psychology with her longitudinal studies.
The study provides practical guidance for educators on differentiated instruction strategies.
This research lays the groundwork for future efforts to close the achievement gap in math and science.
The curriculum overhaul had a measurable positive impact on high school graduation rates.
Our findings suggest that parental involvement is key to improving early literacy skills.
The results demonstrate the effectiveness of project-based learning approaches in middle school science classes.
This study provides important insights into effective strategies for teaching English language learners.
Professor Wilson's work on formative assessment has influenced classroom teaching practices nationwide.
These findings reveal a need for targeted interventions to support struggling readers in elementary school.
The new mentoring program shows promise for improving college access for first-generation students.
Transcripts
when it comes to privacy everyone looks at the most obvious glaring invasions however
when dealing with the very smart engineers in big Tech they have come up with some pretty sneaky
ways of identifying who you are on the internet the scary part is that even the Privacy smart
people aren't even aware of this privacy Invasion or how to get around it the biggest offender or
at least the original player that made serious use of this threat was Zuckerberg that's sneaky
Zucker I noticed this early on and was one of the critical reasons why I left Facebook a dozen years
ago what this is is a list a list that you don't even realize you're in and you have very little
input on whether you appear on this list however be aware that for most of you this is the clear
identifying mark on the internet this is how big Tech can easily find out who you are are
this list is used by many big tech companies not just Facebook and it is a certainty that this is
a massively important technique for three-letter agencies to identify targets it takes some careful
planning to minimize the effect of being on this list if you want to be a serious privacy ninja
then you need to really be aware of this threat and how to deal with it stay right there if you
want to [Music] learn let's first understand a little privacy Theory or have a conceptual
understanding of what I will be talking about if a three-letter agency wants to find out more
about you what is the easiest way to do that let's say you're just some quiet looking dude living in
some obscure small apartment in New York City now you could follow thisy guy around all day or put
in surveillance microphones at his apartment but that would be a very limited source of
information the easiest way folks is just to find out his communication methods typically this would
be a phone or email let's start with the phone a three-letter agency can effortlessly track every
phone call ever made or received and using the MZ of the phone you can then identify who this guy
is calling or who's calling him similarly you can do the same with email just look at all the emails
sent and received and track the various contacts and to Aid in the analysis you also perform the
same research on this person's contacts again checking these people's call records and email
records you could do this through several degrees of separation and believe it or not
you can identify Circles of communities very easily and connect people in various settings
whether by Family socially or in business by doing this kind of tracking I call this kind of data a
relationship map and the two most obvious sources of this data are phone numbers and email addresses
you can see here that if you're tracking some sort of terrorist it would be very hard for that
terrorist to hide history of relationships that are recorded via phone and email and today this
is assured by the application of kyc or know your customer laws that require carriers to collect
certain identifiers so they know the name of the exact person using a particular phone number now
enter big Tech and social media I've made many videos of this before but it is important to
actually give you all a plan of action on how to react to this because the environment keeps
changing unfortunately for all of us a government does not need to collect data on our phone
traffic or our email traffic nowadays this data is willingly given not necessarily Always by you but
given by people you know one of the biggest data leaks is the contact list a large number of people
with an NPC kind of attitude meaning an Nory will just willy-nilly upload a contact list to Facebook
Facebook makes it clear in their data privacy policy that they actually read your contact
list every single day and store that information to develop these relationship Maps a very obvious
implementation of these relationship Maps is when Facebook recommends people as friends because your
phone or email shows up in those people's contact lists now Google's Gmail itself does not even need
to have an uploaded contact list just from every email you send it should be clear who you've ever
sent or receive email to or from so to Google again email is an effortless identifier and most
people do nothing when it comes to the use of the most common identifiers which are phone numbers
and email in fact today platforms are assured of even more data while Facebook Instagram WhatsApp
LinkedIn Tik Tok and so many others are very good at collecting contact lists they also make
sure to match these to you by collecting your own phone number and email the phone number
collected is under the guise of 2fa or two Factor authentication in December 2023 right before the
turn to 2024 I noticed that so many platforms began really active use like seriously active
use of phone numbers for TFA in fact since some of these platforms weren't actively using TFA much
before the sudden aggressive use of TFA phone numbers meant that my phone number was not up
toate on multiple platforms and I temporarily lost access to some of them and this is because
I personally use a specific method to sure that I do not fall into this contactless trap but before
I get into that let me just paint a complete picture here if you go to social media and
create multiple identities because you want some privacy please use your hand and realize that you
are not hiding anything if they can match you to a phone number or an email and once they do they can
retrieve your real name from someone's contact list again understand the problem here it is
not an issue of what you have personally done to destroy your privacy it is your Normy friends and
acquaintances that are ruining your privacy and you have no control over it for example you can
use a fake name with your email or phone number but your friends aren't going to use your fake
name in their contact lists similarly you have no control over what name is associated with your
email address since it depends on how a sender has addressed you also if you are trying to be sneaky
by changing your name on different platforms like Banks shopping sites and social media sites it
won't matter if they can just compare all these and identify which ones are correct and in case
you didn't know your email and phone number will eventually get associated with your credit record
like on Equifax and that will of course match a real identity with a social security number
based on what I've said here it seems like a very daunting problem and one that is hard to
find a solution to however there is a solution but it requires careful planning you need to set
up some rules for yourself when going online it is best to write these rules down for yourself so you
don't make a mistake I'm going to present some of these rules to you today and if you apply it then
the effect of this Rel relationship mapping will be minimal if any and you will be able to maintain
some identity protection on the internet just note that this advice must be accompanied by other
actions to protect your privacy as I discussed elsewhere however these additional ingredients
will not spoil your efforts number one do not ever upload a contact list now this should be
obvious based on what I just said previously but some platforms persist in collecting your contact
list and it is possible that you can accidentally upload it a good example of this is Tik Tok I
think this is Tik tok's primary spying method in retrospect I was testing this and Tik Tok persists
in asking you to upload your contact list and it is very easy to accidentally accept their request
in which case they get one quick upload of your list and your clue of course is that people you
know immediately gets recommended for following I would seriously think about deleting an account
and starting a fresh one if you ever make this mistake because I don't think it's possible to
undo the damage of a permanent contact list being on your records nothing you do later on to protect
yourself will work because the platform will use your contacts to verify your identity at least
electron ically speaking it is safe to say that it is impossible to protect yourself on certain
platforms like Facebook Instagram and WhatsApp so that's a lost cause continue at your own
Peril number two use a different email for every platform although it is not strictly necessary to
have 100 emails for 100 platforms for example you should at least do some partitioning on of your
online presence by email address there should be at least a work email a personal email both
of which may appear on someone's contact list but this is the most important part neither of those
should be used as a platform login never because if you use an email address that is in someone's
contact list then you are clearly identified however to make this concept clearer in your
your head let's say that you used a unique email address for a platform this is actually easy with
an email product that I offer called bmail on bmail you can have unlimited aliases so if your
normal email is John CRA mail.net then you can use an alias like John c-x atra mail.net as your
login tox or John C- Rumble atmail to log into Rumble the point of this is twofold first this
email will not appear in anyone's contact list because it is unique second there will be no email
history associated with these email addresses since they will contain only platform email for
2 FAA notifications at least from an external party viewing it thus the email will be at dead
end as an identifier your identity at least from email will not not leak I think the same benefit
can be achieved even if you just use a different email for all online platforms combined but keep
Financial email like the banks different because it will be recorded on your credit
reports so a healthy separation of emails would be work personal financial online platforms or
alternatively work personal and a different email for every platform but here you must keep accurate
records of your logins and a password manager as you will really be screwed if you forget
what email you used for a platform I made that mistake in X and that's possibly why it's been
hard to reactivate my account I couldn't remember the email I used now let me talk about a different
case here and that's Google so if you go to Google you're using Gmail and many of you use Gmail for
personal use or for work use but don't use the those same Gmail for platform logins meaning
even if you have a personal login don't use that for YouTube use a different one come up with a
third Gmail and that's the one you would use for platform logins so that's the way you would handle
that on the Google end since they're all going to be Gmail number three use a different phone number
for tofa this is a very key instruction given the problem of the phone number being a primary
identifier you must use a different phone number for two- Factor authentication I just use a single
phone number for all my TFA and because of all the requirements that some platforms like Google
require that it be a phone equipped with a Google app I actually have a second Google phone meaning
a standard Android for TFA this phone is off when I'm not using TFA a I don't use it for any other
purpose because tofa requires texting it is not possible to do Wi-Fi only on this phone platforms
now detect if your phone number is a Voiceover IP line like Google Voice Skype or Viber and will ban
that for TFA they want a real phone number so this is really zucked up for privacy but my response is
to have a separate phone let's say your spouse needs a 2fa phone number as well there's no need
to get multiple lines you can share one line and then call each other if there is a need to get
a TFA text message with some authentication code now there are ways to avoid too much of this but
I will explain that later you may think this is a major expense but it's not too bad here in the
USA I have a very cheap SIM card from redpocket I use it only for tofa texting and it is around $60
a year or $5 a month mon again share this with the entire family so everyone's phone number is
protected the important thing to remind yourself again here is that this phone number must not be
known to any of your real contacts no one must call you on this number once someone gets this
phone number and puts it into their contact list then you're identified it is not a concern
if platforms know this number with a caveat use your normal known phone number as toofa
for financial sites like Banks this phone number will be reported to Credit Agencies so it should
not be your TFA phone number a final tip on this change this phone number every once in a while
for safety I realize this is hard work since you have to go to Every site and change your
TFA phone number but I do this all the time and I have an organized workload for it now now number
four use alternate methods for TFA if allowed as of early 2024 there are alternate methods
of tofa and some don't require a phone number for example I've removed all phone numbers from
Google even my YouTube account is not associated with a phone number instead I use a pass key for
2fa unfortunately for Google a pass key is not sufficient they still require some other proof
of identification and fortunately I have my tofa phone with a Google app I don't give them
that phone's tofa number but I use the Google app on it and it is a standard Google Android
so it is possible that they can read the phone number in case you all forget or if you're new
to this channel you should know that I don't use a normally phone as a daily driver I use a phone
with no Google otherwise known as a the Google phone phone so for most things I don't emit any
data on mobile and I'm invisible there other forms of alternate toofa are the use of Hardware Keys
like UB key now the problem with the use of a UB key or other Hardware security key is that not
all platforms are able to use it consistently also some platforms like Google require you to
still use a Google app so they can actually find your identity through the Google app so
you always have to remember which platform uses what and that gets extremely complicated however
because it is Hardware based it is definitely a much more secure option in general I think
pass keys are easier to use and I need to again repeat this because many of you are incorrectly
judging pass Keys pass keys do not pass your Biometrics anywhere the actual exchange with
a platform is done by RS a certificates just like the use of normal internet encryption so there is
nothing to fear about your Biometrics being captured in some way the advantage of a pesy
is if a platform accepts it completely instead of tofa if a platform like Google wants to use
pass keys and then still requires some other tofa then it defeats the purpose and its value
is questionable however in the case of Google is still more convenient because they will ask you
for pass Keys more often than any other method so far Google has not required me to use a phone
number they keep asking for it but but have not required it for tofa they just required me to
use a Google app and that's been rare a Google app is pretty bad because I'm logged in with
my Google ID all the time but I mitigate this by leaving that phone off due to paskis I rarely ever
need to use additional tofa on most sites thus the tofa phone is turned on only a few times a
year now I don't want to give the impression that this is all you have to do and you're safe with
your identity on the internet what I'm trying to explain here is that other measures that I teach
such as protecting your location your IP address your platform IDs are all useless if you don't
understand something this basic all other attempts at privacy will fail if you do not mitigate being
on this relationship map I hope this information has been very helpful I started a company to
provide privacy solutions to the average person instead of just talking about problems today
the primary privacy solution is still to use a degoogle phone a degoogle phone is an invisible
phone on the internet because it has no Google or Apple ID it cannot be precisely identified it is
also immune from being geolocated by Third parties check that out these phones are around $400 so
they are cheaper than normal phones it's what I use we have the bitvpn service which I started
a few years ago the purpose of a VPN services to hide your IP address without any protection
every interaction on the internet will identify your home connection it can also subject you
to managemental attacks where they can see your network traffic it is very important to suppress
this information our VPN service has worldwide coverage and is provided by an entity known to
you me hopefully someone you can trust we have a bmail service that hides identity information
from your email and prevents you from showing up on contact list it also eliminates IP addresses
from show showing up in the header or in the logs we offer unlimited Iles seven domains and web mail
check that out for $50 a year all of these are on my store on brax.me sign up on there and you will
not be asked for personal information to sign up thanks for watching and see you next [Music] time
Browse More Related Video
![](https://i.ytimg.com/vi/iONDebHX9qk/hq720.jpg)
How I Manage My Time - 10 Time Management Tips
![](https://i.ytimg.com/vi/Q55VWgb_-oY/hq720.jpg)
POURQUOI VOULEZ VOUS TRAVAILLER CHEZ NOUS ? 10 EXEMPLES DE RÉPONSES Entretien d'Embauche Simulation
![](https://i.ytimg.com/vi/iuYlGRnC7J8/hq720.jpg)
A Plan Is Not a Strategy
![](https://i.ytimg.com/vi/e-oNu-oYIgo/hq720.jpg?sqp=-oaymwEmCIAKENAF8quKqQMa8AEB-AH-CYAC0AWKAgwIABABGH8gKShIMA8=&rs=AOn4CLANu_2iAPLlKgARPDSJXuFHF4Ij_Q)
hard reset Recovery hapus pola / lupa pin docomo NTT F02H
![](https://i.ytimg.com/vi/uIOtdHqDYzA/hq720.jpg?sqp=-oaymwEmCIAKENAF8quKqQMa8AEB-AH-HYAC8BCKAgwIABABGGUgXShCMA8=&rs=AOn4CLA93vQZFnxhAh-Xsi7vhmmFudbqxg)
The Be Do Have Principle
![](https://i.ytimg.com/vi/sD4ChxJ73RA/hq720.jpg)
English Speaking Lesson (Making Requests In English!)
![](https://i.ytimg.com/vi/3OmyonqobW0/hq720.jpg)
How to Become Insanely Productive
5.0 / 5 (0 votes)