You Do Not Want to Be on This List! 4 Tips to Remember

Rob Braxman Tech
17 Jan 202421:27

Summary

The video is abnormal, and we are working hard to fix it.
Please replace the link and try again.
The video is abnormal, and we are working hard to fix it.
Please replace the link and try again.
The video is abnormal, and we are working hard to fix it.
Please replace the link and try again.

Outlines

The video is abnormal, and we are working hard to fix it.
Please replace the link and try again.

Mindmap

The video is abnormal, and we are working hard to fix it.
Please replace the link and try again.

Keywords

The video is abnormal, and we are working hard to fix it.
Please replace the link and try again.

Highlights

The study found a significant increase in math test scores for students who participated in the after school tutoring program.

Dr. Smith introduced an innovative blended learning approach combining online modules with in-person active learning.

The research presents a new theoretical framework for understanding the role of social support in academic achievement.

This intervention has the potential to greatly improve high school graduation rates in low-income communities.

Our results suggest personalized learning plans may increase student engagement and motivation.

Professor Davis made important contributions to the field of educational psychology with her longitudinal studies.

The study provides practical guidance for educators on differentiated instruction strategies.

This research lays the groundwork for future efforts to close the achievement gap in math and science.

The curriculum overhaul had a measurable positive impact on high school graduation rates.

Our findings suggest that parental involvement is key to improving early literacy skills.

The results demonstrate the effectiveness of project-based learning approaches in middle school science classes.

This study provides important insights into effective strategies for teaching English language learners.

Professor Wilson's work on formative assessment has influenced classroom teaching practices nationwide.

These findings reveal a need for targeted interventions to support struggling readers in elementary school.

The new mentoring program shows promise for improving college access for first-generation students.

Transcripts

play00:00

when it comes to privacy everyone looks at  the most obvious glaring invasions however  

play00:06

when dealing with the very smart engineers in big  Tech they have come up with some pretty sneaky  

play00:11

ways of identifying who you are on the internet  the scary part is that even the Privacy smart  

play00:17

people aren't even aware of this privacy Invasion  or how to get around it the biggest offender or  

play00:24

at least the original player that made serious  use of this threat was Zuckerberg that's sneaky  

play00:30

Zucker I noticed this early on and was one of the  critical reasons why I left Facebook a dozen years  

play00:38

ago what this is is a list a list that you don't  even realize you're in and you have very little  

play00:46

input on whether you appear on this list however  be aware that for most of you this is the clear  

play00:54

identifying mark on the internet this is how  big Tech can easily find out who you are are  

play01:00

this list is used by many big tech companies not  just Facebook and it is a certainty that this is  

play01:08

a massively important technique for three-letter  agencies to identify targets it takes some careful  

play01:15

planning to minimize the effect of being on this  list if you want to be a serious privacy ninja  

play01:24

then you need to really be aware of this threat  and how to deal with it stay right there if you  

play01:30

want to [Music] learn let's first understand  a little privacy Theory or have a conceptual  

play01:41

understanding of what I will be talking about  if a three-letter agency wants to find out more  

play01:47

about you what is the easiest way to do that let's  say you're just some quiet looking dude living in  

play01:54

some obscure small apartment in New York City now  you could follow thisy guy around all day or put  

play02:01

in surveillance microphones at his apartment  but that would be a very limited source of  

play02:07

information the easiest way folks is just to find  out his communication methods typically this would  

play02:14

be a phone or email let's start with the phone a  three-letter agency can effortlessly track every  

play02:23

phone call ever made or received and using the MZ  of the phone you can then identify who this guy  

play02:31

is calling or who's calling him similarly you can  do the same with email just look at all the emails  

play02:38

sent and received and track the various contacts  and to Aid in the analysis you also perform the  

play02:45

same research on this person's contacts again  checking these people's call records and email  

play02:53

records you could do this through several  degrees of separation and believe it or not  

play02:59

you can identify Circles of communities very  easily and connect people in various settings  

play03:07

whether by Family socially or in business by doing  this kind of tracking I call this kind of data a  

play03:15

relationship map and the two most obvious sources  of this data are phone numbers and email addresses  

play03:23

you can see here that if you're tracking some  sort of terrorist it would be very hard for that  

play03:29

terrorist to hide history of relationships that  are recorded via phone and email and today this  

play03:36

is assured by the application of kyc or know your  customer laws that require carriers to collect  

play03:44

certain identifiers so they know the name of the  exact person using a particular phone number now  

play03:52

enter big Tech and social media I've made many  videos of this before but it is important to  

play03:59

actually give you all a plan of action on how  to react to this because the environment keeps  

play04:04

changing unfortunately for all of us a government  does not need to collect data on our phone  

play04:10

traffic or our email traffic nowadays this data is  willingly given not necessarily Always by you but  

play04:19

given by people you know one of the biggest data  leaks is the contact list a large number of people  

play04:26

with an NPC kind of attitude meaning an Nory will  just willy-nilly upload a contact list to Facebook  

play04:33

Facebook makes it clear in their data privacy  policy that they actually read your contact  

play04:38

list every single day and store that information  to develop these relationship Maps a very obvious  

play04:46

implementation of these relationship Maps is when  Facebook recommends people as friends because your  

play04:53

phone or email shows up in those people's contact  lists now Google's Gmail itself does not even need  

play05:00

to have an uploaded contact list just from every  email you send it should be clear who you've ever  

play05:07

sent or receive email to or from so to Google  again email is an effortless identifier and most  

play05:16

people do nothing when it comes to the use of the  most common identifiers which are phone numbers  

play05:22

and email in fact today platforms are assured of  even more data while Facebook Instagram WhatsApp  

play05:30

LinkedIn Tik Tok and so many others are very  good at collecting contact lists they also make  

play05:36

sure to match these to you by collecting your  own phone number and email the phone number  

play05:45

collected is under the guise of 2fa or two Factor  authentication in December 2023 right before the  

play05:54

turn to 2024 I noticed that so many platforms  began really active use like seriously active  

play06:02

use of phone numbers for TFA in fact since some  of these platforms weren't actively using TFA much  

play06:11

before the sudden aggressive use of TFA phone  numbers meant that my phone number was not up  

play06:18

toate on multiple platforms and I temporarily  lost access to some of them and this is because  

play06:26

I personally use a specific method to sure that I  do not fall into this contactless trap but before  

play06:34

I get into that let me just paint a complete  picture here if you go to social media and  

play06:40

create multiple identities because you want some  privacy please use your hand and realize that you  

play06:46

are not hiding anything if they can match you to a  phone number or an email and once they do they can  

play06:55

retrieve your real name from someone's contact  list again understand the problem here it is  

play07:01

not an issue of what you have personally done to  destroy your privacy it is your Normy friends and  

play07:09

acquaintances that are ruining your privacy and  you have no control over it for example you can  

play07:16

use a fake name with your email or phone number  but your friends aren't going to use your fake  

play07:22

name in their contact lists similarly you have  no control over what name is associated with your  

play07:28

email address since it depends on how a sender has  addressed you also if you are trying to be sneaky  

play07:36

by changing your name on different platforms like  Banks shopping sites and social media sites it  

play07:44

won't matter if they can just compare all these  and identify which ones are correct and in case  

play07:50

you didn't know your email and phone number will  eventually get associated with your credit record  

play07:55

like on Equifax and that will of course match  a real identity with a social security number  

play08:03

based on what I've said here it seems like a  very daunting problem and one that is hard to  

play08:08

find a solution to however there is a solution  but it requires careful planning you need to set  

play08:15

up some rules for yourself when going online it is  best to write these rules down for yourself so you  

play08:21

don't make a mistake I'm going to present some of  these rules to you today and if you apply it then  

play08:27

the effect of this Rel relationship mapping will  be minimal if any and you will be able to maintain  

play08:34

some identity protection on the internet just  note that this advice must be accompanied by other  

play08:40

actions to protect your privacy as I discussed  elsewhere however these additional ingredients  

play08:47

will not spoil your efforts number one do not  ever upload a contact list now this should be  

play08:56

obvious based on what I just said previously but  some platforms persist in collecting your contact  

play09:02

list and it is possible that you can accidentally  upload it a good example of this is Tik Tok I  

play09:09

think this is Tik tok's primary spying method in  retrospect I was testing this and Tik Tok persists  

play09:16

in asking you to upload your contact list and it  is very easy to accidentally accept their request  

play09:23

in which case they get one quick upload of your  list and your clue of course is that people you  

play09:29

know immediately gets recommended for following  I would seriously think about deleting an account  

play09:35

and starting a fresh one if you ever make this  mistake because I don't think it's possible to  

play09:41

undo the damage of a permanent contact list being  on your records nothing you do later on to protect  

play09:50

yourself will work because the platform will use  your contacts to verify your identity at least  

play09:58

electron ically speaking it is safe to say that  it is impossible to protect yourself on certain  

play10:05

platforms like Facebook Instagram and WhatsApp  so that's a lost cause continue at your own  

play10:14

Peril number two use a different email for every  platform although it is not strictly necessary to  

play10:23

have 100 emails for 100 platforms for example you  should at least do some partitioning on of your  

play10:29

online presence by email address there should  be at least a work email a personal email both  

play10:37

of which may appear on someone's contact list but  this is the most important part neither of those  

play10:45

should be used as a platform login never because  if you use an email address that is in someone's  

play10:52

contact list then you are clearly identified  however to make this concept clearer in your  

play10:59

your head let's say that you used a unique email  address for a platform this is actually easy with  

play11:06

an email product that I offer called bmail on  bmail you can have unlimited aliases so if your  

play11:13

normal email is John CRA mail.net then you can  use an alias like John c-x atra mail.net as your  

play11:23

login tox or John C- Rumble atmail to log into  Rumble the point of this is twofold first this  

play11:34

email will not appear in anyone's contact list  because it is unique second there will be no email  

play11:41

history associated with these email addresses  since they will contain only platform email for  

play11:47

2 FAA notifications at least from an external  party viewing it thus the email will be at dead  

play11:54

end as an identifier your identity at least from  email will not not leak I think the same benefit  

play12:01

can be achieved even if you just use a different  email for all online platforms combined but keep  

play12:08

Financial email like the banks different  because it will be recorded on your credit  

play12:13

reports so a healthy separation of emails would  be work personal financial online platforms or  

play12:23

alternatively work personal and a different email  for every platform but here you must keep accurate  

play12:31

records of your logins and a password manager  as you will really be screwed if you forget  

play12:36

what email you used for a platform I made that  mistake in X and that's possibly why it's been  

play12:42

hard to reactivate my account I couldn't remember  the email I used now let me talk about a different  

play12:48

case here and that's Google so if you go to Google  you're using Gmail and many of you use Gmail for  

play12:55

personal use or for work use but don't use the  those same Gmail for platform logins meaning  

play13:03

even if you have a personal login don't use that  for YouTube use a different one come up with a  

play13:09

third Gmail and that's the one you would use for  platform logins so that's the way you would handle  

play13:16

that on the Google end since they're all going to  be Gmail number three use a different phone number  

play13:23

for tofa this is a very key instruction given  the problem of the phone number being a primary  

play13:30

identifier you must use a different phone number  for two- Factor authentication I just use a single  

play13:37

phone number for all my TFA and because of all  the requirements that some platforms like Google  

play13:43

require that it be a phone equipped with a Google  app I actually have a second Google phone meaning  

play13:51

a standard Android for TFA this phone is off when  I'm not using TFA a I don't use it for any other  

play14:01

purpose because tofa requires texting it is not  possible to do Wi-Fi only on this phone platforms  

play14:08

now detect if your phone number is a Voiceover IP  line like Google Voice Skype or Viber and will ban  

play14:15

that for TFA they want a real phone number so this  is really zucked up for privacy but my response is  

play14:23

to have a separate phone let's say your spouse  needs a 2fa phone number as well there's no need  

play14:30

to get multiple lines you can share one line and  then call each other if there is a need to get  

play14:36

a TFA text message with some authentication code  now there are ways to avoid too much of this but  

play14:43

I will explain that later you may think this is  a major expense but it's not too bad here in the  

play14:48

USA I have a very cheap SIM card from redpocket I  use it only for tofa texting and it is around $60  

play14:57

a year or $5 a month mon again share this with  the entire family so everyone's phone number is  

play15:03

protected the important thing to remind yourself  again here is that this phone number must not be  

play15:08

known to any of your real contacts no one must  call you on this number once someone gets this  

play15:15

phone number and puts it into their contact  list then you're identified it is not a concern  

play15:21

if platforms know this number with a caveat  use your normal known phone number as toofa  

play15:29

for financial sites like Banks this phone number  will be reported to Credit Agencies so it should  

play15:37

not be your TFA phone number a final tip on this  change this phone number every once in a while  

play15:45

for safety I realize this is hard work since  you have to go to Every site and change your  

play15:52

TFA phone number but I do this all the time and I  have an organized workload for it now now number  

play16:00

four use alternate methods for TFA if allowed  as of early 2024 there are alternate methods  

play16:08

of tofa and some don't require a phone number  for example I've removed all phone numbers from  

play16:15

Google even my YouTube account is not associated  with a phone number instead I use a pass key for  

play16:22

2fa unfortunately for Google a pass key is not  sufficient they still require some other proof  

play16:30

of identification and fortunately I have my  tofa phone with a Google app I don't give them  

play16:37

that phone's tofa number but I use the Google  app on it and it is a standard Google Android  

play16:43

so it is possible that they can read the phone  number in case you all forget or if you're new  

play16:49

to this channel you should know that I don't use  a normally phone as a daily driver I use a phone  

play16:55

with no Google otherwise known as a the Google  phone phone so for most things I don't emit any  

play17:01

data on mobile and I'm invisible there other forms  of alternate toofa are the use of Hardware Keys  

play17:09

like UB key now the problem with the use of a UB  key or other Hardware security key is that not  

play17:17

all platforms are able to use it consistently  also some platforms like Google require you to  

play17:23

still use a Google app so they can actually  find your identity through the Google app so  

play17:29

you always have to remember which platform uses  what and that gets extremely complicated however  

play17:35

because it is Hardware based it is definitely  a much more secure option in general I think  

play17:42

pass keys are easier to use and I need to again  repeat this because many of you are incorrectly  

play17:48

judging pass Keys pass keys do not pass your  Biometrics anywhere the actual exchange with  

play17:55

a platform is done by RS a certificates just like  the use of normal internet encryption so there is  

play18:05

nothing to fear about your Biometrics being  captured in some way the advantage of a pesy  

play18:12

is if a platform accepts it completely instead  of tofa if a platform like Google wants to use  

play18:19

pass keys and then still requires some other  tofa then it defeats the purpose and its value  

play18:26

is questionable however in the case of Google is  still more convenient because they will ask you  

play18:31

for pass Keys more often than any other method  so far Google has not required me to use a phone  

play18:38

number they keep asking for it but but have not  required it for tofa they just required me to  

play18:43

use a Google app and that's been rare a Google  app is pretty bad because I'm logged in with  

play18:50

my Google ID all the time but I mitigate this by  leaving that phone off due to paskis I rarely ever  

play18:59

need to use additional tofa on most sites thus  the tofa phone is turned on only a few times a

play19:06

year now I don't want to give the impression that  this is all you have to do and you're safe with  

play19:15

your identity on the internet what I'm trying to  explain here is that other measures that I teach  

play19:22

such as protecting your location your IP address  your platform IDs are all useless if you don't  

play19:28

understand something this basic all other attempts  at privacy will fail if you do not mitigate being  

play19:36

on this relationship map I hope this information  has been very helpful I started a company to  

play19:45

provide privacy solutions to the average person  instead of just talking about problems today  

play19:52

the primary privacy solution is still to use a  degoogle phone a degoogle phone is an invisible  

play19:58

phone on the internet because it has no Google or  Apple ID it cannot be precisely identified it is  

play20:05

also immune from being geolocated by Third parties  check that out these phones are around $400 so  

play20:12

they are cheaper than normal phones it's what I  use we have the bitvpn service which I started  

play20:19

a few years ago the purpose of a VPN services  to hide your IP address without any protection  

play20:25

every interaction on the internet will identify  your home connection it can also subject you  

play20:30

to managemental attacks where they can see your  network traffic it is very important to suppress  

play20:35

this information our VPN service has worldwide  coverage and is provided by an entity known to  

play20:42

you me hopefully someone you can trust we have  a bmail service that hides identity information  

play20:50

from your email and prevents you from showing up  on contact list it also eliminates IP addresses  

play20:57

from show showing up in the header or in the logs  we offer unlimited Iles seven domains and web mail  

play21:05

check that out for $50 a year all of these are on  my store on brax.me sign up on there and you will  

play21:14

not be asked for personal information to sign up  thanks for watching and see you next [Music] time