How To Secure and Anonymize Your Online Activity

Mental Outlaw
5 Nov 202025:10

Summary

TLDRThis script discusses the importance of personal data privacy and the risks of centralized data collection by entities like hackers, governments, and corporations. It suggests practical steps to enhance privacy, such as using a password manager, creating multiple email accounts, avoiding biometrics, and utilizing secure communication platforms. The video also covers browser security, search engine privacy, and the use of VPNs and Tor for anonymous browsing, emphasizing the need to avoid services designed for tracking.

Takeaways

  • ๐Ÿ”’ Personal data is highly valuable and sought after by various entities for tracking and exploitation.
  • ๐Ÿ›ก๏ธ To protect privacy, it's essential to change online habits and use technology that enhances privacy and anonymity.
  • ๐Ÿ”‘ Decentralizing online accounts and using a password manager with multiple email addresses can prevent hackers from accessing linked accounts.
  • ๐Ÿ’ผ Using offline password managers like KeePassXC or GnuPass avoids reliance on cloud services that may compromise anonymity.
  • ๐Ÿ“ง Creating separate permanent and temporary email accounts for different purposes can reduce the risk of data breaches affecting all accounts.
  • ๐Ÿ‘๏ธ Avoiding biometrics for securing data is crucial in a model that includes law enforcement as a threat, as biometrics can be forcibly taken.
  • ๐Ÿ”’ Using hardware security keys for two-factor authentication adds an extra layer of security, especially against government surveillance.
  • ๐Ÿ“ฑ Real-time communication should use end-to-end encrypted services like Signal to prevent interception by third parties.
  • ๐ŸŒ Securing the browser is vital; avoid browsers that track users and opt for privacy-respecting alternatives like GNU IceCat or Firefox with enhanced security settings.
  • ๐Ÿšซ Disabling JavaScript in the browser can prevent tracking and fingerprinting, though it may limit functionality on sites reliant on JS.
  • ๐Ÿ”Ž Use private search engines like DuckDuckGo or Searx to avoid the tracking associated with mainstream search engines like Google.
  • ๐ŸŒ Implementing multiple browser profiles for different activities can prevent cross-site tracking and protect user privacy.

Q & A

  • Why is personal data considered valuable and sought after by various entities?

    -Personal data is valuable because it paints a detailed picture of an individual's identity, preferences, and behaviors. Entities like hackers, governments, and corporations seek this data to exploit it for surveillance, marketing, or other purposes.

  • What is the main issue with using a single email address for all online accounts?

    -Using a single email address for all online accounts centralizes your information, making it vulnerable to data breaches. If the email or password is compromised, it can lead to unauthorized access to all connected accounts.

  • Why is it recommended to use a password manager and multiple email addresses?

    -A password manager helps create and store unique, strong passwords for each account, reducing the risk of breaches. Multiple email addresses prevent linking personal accounts to one another, minimizing the damage if one account is compromised.

  • What are some privacy-respecting email services mentioned in the script?

    -The script recommends using 2D, Nodameil, Mailfence, and ProtonMail as privacy-respecting email services that should be signed up for over the Tor network.

  • How can using biometrics for security potentially compromise privacy?

    -Biometrics like fingerprints or face scans can be forcibly taken by governments or other entities to unlock personal data or devices. Unlike passwords, they cannot be changed once compromised.

  • What is the recommended approach for real-time communication to ensure privacy?

    -The script suggests using end-to-end encrypted messaging services like Signal, Element, or peer-to-peer solutions like Briar or Yami to avoid interception of messages by unauthorized parties.

  • Why should browsers like Google Chrome be avoided for privacy-conscious users?

    -Browsers like Google Chrome are created by companies that profit from user tracking. Their default settings may not respect privacy and could include hidden tracking features that are difficult to disable.

  • What is the purpose of using a hardware security key for two-factor authentication?

    -A hardware security key adds an extra layer of security by requiring a physical device to access accounts. If lost or damaged, it renders the accounts inaccessible, which can be a last resort to protect privacy in extreme situations.

  • How can using a VPN enhance privacy while browsing?

    -A VPN encrypts internet traffic and hides the user's IP address, making it difficult for ISPs, governments, or other entities to track online activities or link them to the user's identity.

  • What is the significance of using the Tor network for anonymous browsing?

    -The Tor network provides anonymity by routing internet traffic through multiple proxy servers, making it challenging to trace the user's real IP address and browsing activity.

  • How can users avoid being tracked by online services that collect personal data?

    -Users can avoid tracking by using privacy-focused alternatives to mainstream services, employing browser privacy settings, using ad blockers, and creating separate browser profiles for different activities.

Outlines

00:00

๐Ÿ”’ Protecting Personal Data from Hackers and Corporations

The paragraph emphasizes the value of personal data and the risks associated with centralized online accounts and password reuse. It suggests using a password manager and multiple email addresses to prevent unauthorized access. The author recommends offline password managers like KeePassXC or GNU Pass and advises against using online services that sync data to their cloud. The paragraph also discusses the importance of creating permanent and burner email accounts, with specific services recommended for each type, and highlights the need to sign up for these services over the Tor network to ensure anonymity.

05:01

๐Ÿ›ก๏ธ Enhancing Privacy with a Threat Model and Secure Communication

This paragraph discusses the concept of a threat model for online security, cautioning against the use of biometrics due to their vulnerability to forced extraction. It advocates for two-factor authentication with hardware security keys for added protection. The paragraph also addresses the importance of secure real-time communication, recommending end-to-end encrypted messaging apps like Signal, Element, and peer-to-peer solutions such as Briar or Yami, while noting the potential risks of centralized services.

10:03

๐ŸŒ Securing the Browser and Online Activity

The focus of this paragraph is on browser security, discouraging the use of Google Chrome due to privacy concerns and promoting alternatives like GNU IceCat and Firefox with enhanced privacy settings. It explains how to use tools like mpv to view YouTube videos without JavaScript, which can be a privacy risk. The paragraph also covers browser add-ons for local content delivery and the use of multiple browser profiles to prevent tracking by online services, suggesting the use of a VPN for additional privacy.

15:05

๐Ÿ”Ž Privacy-Centric Search and Online Interaction

The paragraph advises against using search engines like Google and Bing due to their tracking mechanisms, instead promoting privacy-focused search engines such as DuckDuckGo, StartPage, and Searx. It discusses the use of multiple browser profiles for different purposes to avoid tracking and the importance of not mixing clearnet and VPN accounts. It also touches on the use of a VPN to protect against ISP tracking and government surveillance, recommending Mulvad for its no-log policy and anonymous payment options.

20:06

โš ๏ธ Advanced Anonymity Techniques and Avoiding Tracking

This paragraph delves into more advanced privacy measures, such as using the Tor network for anonymous browsing and the importance of blocking JavaScript to prevent IP leaks. It warns against using personal accounts created with a public IP address while on Tor and suggests creating anonymous accounts for services that require phone verification. The author also encourages spreading awareness about Tor to increase its user base and make it harder for individuals to be identified. The paragraph concludes by advising against using online services known for tracking users and hints at further topics for potential future videos.

Mindmap

Keywords

๐Ÿ’กPersonal Data

Personal data refers to any information that can be used to identify an individual, such as search queries, entertainment choices, and web history. In the video, it is highlighted as valuable and sought after by hackers, governments, and corporations for profiling individuals. The script emphasizes the importance of protecting one's personal data to prevent exploitation.

๐Ÿ’กPrivacy

Privacy in the context of the video is the state of being free from unauthorized intrusion or surveillance. It is a central theme, as the script discusses various methods to enhance privacy and anonymity online, such as using password managers and avoiding services that compromise personal information.

๐Ÿ’กDecentralization

Decentralization, as mentioned in the script, involves spreading out online accounts and information across different platforms and services to reduce the risk of a single point of failure. This is exemplified by using multiple email addresses and password managers to prevent data breaches from affecting all linked accounts.

๐Ÿ’กPassword Manager

A password manager is a tool that securely stores and manages login credentials for various online accounts. The script recommends using one to prevent the reuse of passwords across accounts, which can lead to security vulnerabilities if a single account is compromised.

๐Ÿ’กData Breach

A data breach occurs when unauthorized individuals gain access to sensitive information. The video script uses the term to illustrate the risks of using a single email and password for multiple accounts, as a breach in one service can expose all connected accounts to hackers.

๐Ÿ’กAnonymity

Anonymity is the state of being unidentified or unrecognizable. The script discusses the use of technology and practices to maintain anonymity online, such as using a VPN, Tor, and avoiding biometric data that can be forcibly obtained.

๐Ÿ’กTwo-Factor Authentication (2FA)

Two-factor authentication is a security process that requires two methods of verification to access an account. The video mentions using a hardware security key for 2FA as a more secure method than SMS or email verification, which can be intercepted.

๐Ÿ’กEnd-to-End Encryption

End-to-end encryption ensures that messages can only be read by the sender and the intended recipient, with nobody in between able to decrypt the content. The script recommends using messaging services with this feature to protect the privacy of real-time communications.

๐Ÿ’กVPN (Virtual Private Network)

A VPN is a service that creates a secure, encrypted connection over the internet, masking the user's IP address and location. The video discusses using a VPN to enhance privacy by preventing ISPs and governments from tracking online activities, but also cautions about the importance of choosing a trustworthy provider.

๐Ÿ’กTor Network

The Tor network is an anonymity network that allows users to browse the internet without revealing their IP address. The script mentions using Tor for anonymous browsing and signing up for services, but also warns about the potential risks if not used correctly.

๐Ÿ’กBrowser Fingerprinting

Browser fingerprinting is a technique used to track users based on their browser's unique characteristics, even without cookies. The video script suggests using certain browsers and add-ons to prevent this type of tracking and maintain privacy.

Highlights

Personal data is valuable and often exploited by hackers, governments, and corporations.

Most people wouldn't share their internet history with close ones, yet they risk sharing it with entities that may exploit it.

The solution to tracking is to take privacy into your own hands by changing habits and using technology.

Decentralizing online accounts is crucial to prevent data breaches affecting multiple services.

Using a single email and password across accounts concentrates information and increases vulnerability.

A password manager like KeePassXC or GnuPass can secure passwords and prevent hacks.

Avoid password managers that require payment or online registration as they may compromise anonymity.

Creating separate permanent and burner email addresses helps maintain privacy and security.

Services like 2D NodA, MailFence, and ProtonMail are recommended for permanent email accounts.

Temporary email services like TempMail are useful for short-term or throwaway accounts.

Creating a threat model helps identify who and what you are securing your online activity from.

Biometric data can be compromised by law enforcement, so passwords are a safer option.

Using a hardware security key like a U2F adds an extra layer of security for accounts.

Avoid SMS for messaging as it's not encrypted and can be easily intercepted.

Signal is an easy-to-use, open-source messenger with end-to-end encryption.

For more privacy, federated services like Element or peer-to-peer solutions like Briar or Yami are recommended.

Securing the browser is essential; avoid browsers like Google Chrome that may track users.

GNU IceCat is a spyware-free browser with good security settings, but has limitations with JavaScript-heavy sites.

Using mpv with YouTube URLs can bypass JavaScript limitations and age restrictions.

For a more user-friendly browser with security, consider Firefox with additional privacy settings and extensions.

Decentraleyes add-on can block unnecessary connections to CDNs and speed up page loading times.

Avoid search engines that track you; use DuckDuckGo, StartPage, or Sir X for more privacy.

Implementing multiple browser profiles for different use cases can reduce tracking.

Using a VPN like Mulvad can increase privacy by shifting tracking responsibility away from the ISP.

When using a VPN, avoid mixing clearnet and VPN accounts to prevent linking activities to your identity.

For true anonymity, use Tor, but also block JavaScript and avoid linking accounts to your real IP.

Spreading information about privacy tools like Tor can increase its effectiveness by making it harder to identify users.

Avoid online services known for tracking users, such as Google, Facebook, and Twitter.

Securing home Wi-Fi, computers, and smartphones, as well as anonymous internet surfing, are also important aspects of privacy.

Transcripts

play00:00

your personal data is very valuable

play00:03

it is no wonder that hackers governments

play00:06

and corporations are trying to collect

play00:09

and catalog

play00:10

everything about you your search queries

play00:14

your entertainment choices web history

play00:17

online chats and posts all paint a very

play00:20

detailed picture

play00:22

about who you are most people wouldn't

play00:24

even share their internet history

play00:26

with the closest people to them in their

play00:28

lives so

play00:30

why would you want to share it with

play00:32

people that actually have

play00:34

an incentive to exploit all of your

play00:37

personal data

play00:38

and have access to it there is a

play00:41

solution to

play00:42

stopping the tracking though and that is

play00:44

to take matters into your own hands

play00:47

and start protecting your data by

play00:50

changing habits

play00:51

and using the correct technology to

play00:53

enhance your privacy

play00:55

and anonymity now right off the bat

play00:58

i will tell you that these steps are

play01:00

going to add

play01:02

a bit of a challenge to your computer

play01:04

and browsing habits

play01:06

the web is designed in such a way to not

play01:09

be private

play01:10

and combine that with a life of people

play01:13

being conditioned

play01:14

to trade off their privacy for

play01:16

convenience

play01:18

well i'm going to show you will enhance

play01:21

your privacy

play01:22

and your security but it's going to make

play01:24

things a bit more complicated

play01:26

the first step is to decentralize your

play01:29

online accounts

play01:31

most people are using a single

play01:34

non-privacy respecting

play01:35

email to sign up for everything from

play01:38

netflix to spotify

play01:40

grubhub uber etc and what's worse

play01:44

is they will oftentimes use the same

play01:47

password across all of these accounts

play01:50

including

play01:51

the email and there is so much of your

play01:54

information that is going to be

play01:55

concentrated within that single email

play01:58

address especially if you're also using

play02:00

it

play02:00

as your primary email for correspondence

play02:04

and if you're reusing passwords well

play02:07

if any one of the services that are

play02:09

connected to it has a data breach that

play02:11

releases that password

play02:13

your email and password will become

play02:15

available to that hacker

play02:17

and then they have access to everything

play02:19

and vice versa if the email

play02:22

service itself has a breach then all of

play02:24

the accounts that are connected to it

play02:26

become vulnerable to hacking the

play02:29

simplest way to prevent this

play02:31

issue is to use a password manager

play02:34

along with multiple different email

play02:36

addresses

play02:37

this is this way your accounts they

play02:40

can't get hacked

play02:42

and your services cannot be personally

play02:44

linked to one another

play02:47

for securing your passwords i recommend

play02:50

using

play02:50

keepassxc or gnu pass

play02:54

you should really avoid any password

play02:56

manager solution that asks you to pay

play02:58

money

play02:59

or does an online registration and

play03:02

syncing of your data to their cloud as

play03:05

that would compromise the anonymity of

play03:08

it

play03:09

unless you use tor and a burner email to

play03:12

sign up for it

play03:13

then it's going to be a little bit safer

play03:15

than just using clearnet

play03:17

and an email that is connected to your

play03:21

identity

play03:22

but again i just suggest using an

play03:24

offline password manager

play03:27

and that brings me to the next subject

play03:29

which is creating

play03:30

your email accounts so

play03:34

there's two kinds of email services that

play03:36

we'll be using here

play03:38

there are permanent email addresses and

play03:41

burner emails permanent emails are ones

play03:44

that you are going to be using

play03:46

indefinitely you'll want to use these

play03:49

either for

play03:50

sending and receiving email for the

play03:53

foreseeable future

play03:54

or doing any kind of email

play03:56

correspondence

play03:57

using it for things like job hunting and

play04:00

so on and so forth

play04:01

uh or if you need to get alerts for

play04:04

accounts that are created

play04:05

using this email so the services that i

play04:08

would recommend for using this

play04:10

is 2d noda mail fence and

play04:13

protonmail these services they should be

play04:16

signed up for over the tor network

play04:19

and it's also advisable to request a new

play04:21

identity

play04:23

on the torn network meaning you get a

play04:24

different ip address

play04:26

before creating each one or if you're

play04:29

going to

play04:29

create multiple emails using the same

play04:32

provider

play04:33

and that way none of those different

play04:36

email addresses can be linked to one

play04:38

another

play04:38

in any way and for temporary email

play04:42

you should be using tempmail.org

play04:47

tempmailow.com or gorilla mail

play04:50

and these are mostly helpful for

play04:52

creating

play04:53

what you would call throwaway accounts

play04:55

so these are going to be accounts that

play04:57

you either don't really care about

play04:59

or something that you're just going to

play05:00

be using for a short period of time

play05:03

like to redeem some type of coupon or

play05:06

something like that

play05:08

now one important thing to keep in mind

play05:10

when you're going to be

play05:12

securing your online activity is to

play05:15

create a

play05:16

threat model so this is going to be who

play05:19

and what you are actually going to be

play05:22

securing from

play05:23

if your threat model includes law

play05:25

enforcement

play05:26

then you should take the additional step

play05:28

of not using

play05:30

any biometrics to secure any of your

play05:32

data or devices

play05:34

because fingerprints face scans and ira

play05:37

scans

play05:38

they can be forcefully taken from you to

play05:41

unlock your data

play05:42

and unlock your devices by governments

play05:45

well

play05:45

passwords cannot unless of course

play05:48

you willingly give them up which could

play05:51

likely happen

play05:52

if you are subjugated to enhanced

play05:54

interrogation techniques

play05:56

so in addition to not using biometrics

play06:00

a government threat model should include

play06:03

a two-factor authentication with

play06:06

a hardware security key like a ub

play06:09

key for example and the thing about

play06:12

using

play06:13

a hardware security key is that if this

play06:15

key were to become lost or damaged

play06:18

all of your accounts that are requiring

play06:20

it would become

play06:21

inaccessible so this would be a last

play06:24

stitch

play06:24

a good last stitch effort if the glow

play06:26

boys come knocking you can just

play06:28

destroy your ub key and then all of

play06:30

those accounts would be

play06:32

inaccessible now we're going to talk

play06:35

about

play06:35

real-time communication for that there

play06:38

are a few options

play06:40

but this is where some additional work

play06:42

needs to be done

play06:43

for messaging you want to avoid sms

play06:47

at all cost green bubbles on an iphone

play06:50

would be an example of an sms

play06:52

conversation

play06:54

these communications are not encrypted

play06:56

at all meaning that they can be

play06:57

intercepted in plain text

play06:59

by cellular carriers governments or any

play07:03

hackers that are

play07:04

snooping on the conversation so in order

play07:07

to avoid

play07:08

sms being used both parties have to use

play07:12

the same kind of service that supports

play07:15

end-to-end encryption and that's where

play07:17

the tough part is going to come in

play07:18

because

play07:19

obviously you're going to need to get

play07:21

your friends family whoever you want to

play07:23

communicate with

play07:25

to use one of these services that

play07:28

they've probably never heard

play07:30

of you know these services generally

play07:32

aren't advertised

play07:34

very much so it's going to be a little

play07:36

bit tough to get normies to use them

play07:38

but they're not terribly difficult to

play07:40

use

play07:41

the easiest one for noobs is going to be

play07:43

signal so it's an open source messenger

play07:46

that features

play07:47

end-to-end encryption it also supports a

play07:49

voice as well as video calling

play07:52

so this is pretty easy to use but

play07:55

there is a disadvantage to using

play07:57

something like signal which is that

play07:59

it's still a centralized service which

play08:03

means that it's going to be more

play08:04

susceptible

play08:05

to backdoor access by any governments

play08:09

the ownership of the service could also

play08:12

very easily change

play08:13

into the hands of someone who doesn't

play08:15

really care so much about

play08:17

the end user's privacy so

play08:20

if this is more of a concern to you then

play08:22

i recommend that you use and

play08:24

convince your friend to use a federated

play08:27

service

play08:28

like element or use a peer-to-peer

play08:31

solution

play08:32

such as briar or yami

play08:36

next we want to secure the browser

play08:39

because this is another tool that is

play08:41

often used by corporations to collect

play08:43

information from people

play08:45

so it's important to use one with good

play08:48

security settings

play08:50

out of the gate as well as to go through

play08:52

any configuration

play08:54

options to further harden it and it's

play08:56

also a good idea to

play08:58

not use a browser like google chrome

play09:01

that is created

play09:02

by a company that profits from tracking

play09:06

because obviously there's going to be

play09:08

incentive in there to have the default

play09:10

settings

play09:11

to not be privacy respecting as well as

play09:14

to put hidden settings in there

play09:16

that are still going to track you that

play09:18

the user either can't easily delete

play09:20

or cannot disable at all so a good

play09:24

option for a spyware free browser that

play09:27

meets all these requirements

play09:29

right out of the box is going to be gnu

play09:32

ice cap

play09:33

now you will have limited options

play09:37

for viewing sites that heavily rely on

play09:40

javascript though

play09:41

one very commonly used example would

play09:45

be youtube so you can see

play09:48

in gnu icecat when you try to load a

play09:50

youtube video

play09:51

it doesn't really play it kind of plays

play09:53

like one frame

play09:55

at a time if you hit the play button

play09:58

sometimes you can refresh it

play10:00

and it will sort of start playing the

play10:03

video at first for a few seconds

play10:05

but then as you can see it stops now

play10:08

there are some ways to get around

play10:11

something like this

play10:12

um you'll want to download

play10:16

mpv and use that to

play10:19

be able to view youtube videos uh

play10:22

whenever you

play10:23

come across one in gnu ice cad so all

play10:26

that you have to do

play10:27

is copy the url we'll get rid of this

play10:30

bit here

play10:33

so copy the url and then open up a

play10:35

terminal

play10:36

and then you just type mpv and then

play10:39

paste in

play10:40

the video url

play10:47

okay i had to pause and update

play10:50

my youtube dl you can still update it by

play10:55

the way there's

play10:56

tons of forks of it available on github

play10:59

you might not be able to just do it

play11:01

through your package manager

play11:03

so all you have to do because mpv

play11:06

to do this particular function utilizes

play11:08

youtube dl

play11:10

is just download it from github the

play11:13

updated one

play11:14

and install it and then it should

play11:16

automatically plug

play11:17

into mpv but anyway as i was trying to

play11:20

show you before

play11:21

you could just type mpv followed by the

play11:24

url

play11:25

of the video that you're trying to watch

play11:28

and

play11:28

in ice cat it's going to be right before

play11:31

this

play11:31

and disable polymer equals true

play11:35

and hit enter

play11:43

and there's actually some pretty handful

play11:46

things that you can do in here like for

play11:48

example you can

play11:49

step through frame by frame so this is

play11:51

something that

play11:53

not even youtube itself supports

play11:56

now obviously you're not going to be

play11:58

able to comment or leave a like or

play12:00

anything like that within mpv so

play12:03

if you really need to do that if you

play12:06

need to actually interact with it

play12:07

via your youtube account you're going to

play12:10

want to

play12:11

sign into youtube probably from a

play12:14

different browser profile

play12:15

or a different browser altogether

play12:17

because again with good new ice cat

play12:20

the javascript limitations make a lot of

play12:23

those features not really work so well

play12:25

and then you can do uh whatever you need

play12:28

to do

play12:29

with your youtube account uh also by the

play12:31

way

play12:33

using mpv to view youtube videos is a

play12:36

way that you can

play12:37

bypass age restricted videos so mpv

play12:41

it's not going to ask you to verify your

play12:43

age

play12:44

youtube of course if you click on an age

play12:47

restricted video it's going to ask you

play12:48

hey

play12:49

sign in to verify that you're over 18 or

play12:52

whatever

play12:53

you can just do exactly what i showed

play12:55

you here copy that url

play12:57

and paste it into the mpv command and

play13:00

you're good to go it's also worth noting

play13:03

that

play13:04

this is usually lighter on your system

play13:07

resources

play13:08

than just watching a youtube video in

play13:11

your browser directly

play13:13

and it's not actually downloading the

play13:15

video to be saved it's just streaming it

play13:17

so

play13:18

there's not going to be any privacy

play13:19

concerns or

play13:21

storage space concerns there either

play13:24

for an easier to use browser that still

play13:27

has good security settings

play13:29

i would recommend using firefox however

play13:33

you're going to want to change some of

play13:36

your

play13:36

security settings um certain things

play13:40

like you don't want to store cookies you

play13:42

want to just delete those

play13:44

after firefox is closed you don't really

play13:47

want

play13:48

to autofill addresses or credit cards

play13:52

and in your address bar you probably

play13:54

don't want it saving browser history

play13:56

browsing history bookmarks

play13:58

uh anything else like that and you'll

play14:00

also want to install

play14:01

the ghax user.js

play14:04

to automatically import the most secure

play14:08

browser settings that disable things

play14:10

like webrtc

play14:12

uh geolocation and unique fingerprinting

play14:16

and you're also going to want to install

play14:18

an ad blocker

play14:20

like u-block origin

play14:23

that way you can selectively disable

play14:25

javascript on sites because basically

play14:27

all of the ads that are displayed to you

play14:29

those are all driven by javascript

play14:32

as we saw with gnu icecat it just

play14:35

disables all of them

play14:36

so you're not going to see any

play14:38

javascript at all but

play14:40

that breaks websites using ublock origin

play14:46

you can go into the advanced user

play14:48

settings

play14:49

and also disable javascript here and

play14:52

then

play14:53

what that does is it basically shows you

play14:55

individual scripts that are getting

play14:57

loaded on

play14:58

a webpage usually i would globally

play15:01

disable third-party scripts and you

play15:04

could just lock that so that's

play15:05

automatically going to do it on every

play15:07

new page

play15:08

but then whenever you load another site

play15:12

then it's going to show other domains

play15:14

that you want to block scripts from

play15:16

obviously two denoted they don't have a

play15:18

whole lot of ads showing here but

play15:20

if you're on a site that is heavy in ads

play15:22

this is going to be really really long

play15:24

and you can go through uh blacklisting

play15:27

as many sites as possible or as many

play15:30

domains as possible that are showing

play15:32

scripts

play15:33

until you get the site to a point where

play15:36

it's still functional but it's just not

play15:37

showing

play15:38

anything additional that isn't necessary

play15:42

for the site to actually work

play15:44

and you'll also want to use the

play15:47

decentralize

play15:48

add-on for local content delivery

play15:52

network emulation

play15:54

so this is going to block unnecessary

play15:56

connections to

play15:57

cdns like cloudflare and google

play16:01

and it can also speed up the loading

play16:03

time of some pages by

play16:04

loading the relevant web libraries

play16:07

locally

play16:08

on the user's machine now

play16:11

while we're still in the browser you

play16:13

should also avoid

play16:14

using search engines that are built to

play16:16

track you this means that

play16:18

google and bing they should not be used

play16:22

for your search queries moving forward

play16:24

at least not within

play16:25

the same privacy browsing profile

play16:29

instead you should use services like

play16:31

duckduckgo

play16:33

or start page to emulate google results

play16:36

in a more

play16:37

private way what i would recommend most

play16:40

though

play16:40

is sir x as it is the most open source

play16:44

uh well not open source but most open

play16:47

and transparent search engine

play16:49

that is currently available on the web

play16:52

and finally you're going to want to

play16:54

implement the use of

play16:56

multiple profiles within the browser

play16:59

for different use cases this is

play17:02

useful for situations where you might

play17:06

want to use

play17:07

youtube to leave comments on your

play17:09

favorite creators page

play17:11

uh or maybe even upload a youtube video

play17:13

if you're a content creator yourself

play17:16

but if you just want to view other

play17:18

random things that

play17:20

you know you aren't going to need a

play17:22

youtube profile for

play17:24

to interact with it's best to just

play17:26

browse to those pages

play17:28

from another browser profile altogether

play17:30

where you aren't signed into your social

play17:33

media accounts

play17:34

and that's going to prevent those

play17:36

companies from tracking your watch

play17:38

history

play17:39

within the accounts themselves because

play17:41

of course they

play17:42

ultimately control the account they let

play17:45

you have it for

play17:46

free but anytime there's a service where

play17:49

something is free chances are you are

play17:51

the product

play17:52

so this is going to reduce the amount of

play17:54

information that they're able to harvest

play17:56

from you

play17:57

by not using it when you don't need it

play18:00

and if you do

play18:01

happen to stumble upon a video that you

play18:04

want to

play18:05

comment on or do something else that

play18:07

requires an account

play18:09

you know just keep in mind age

play18:11

restriction doesn't require an account

play18:13

to bypass

play18:14

you can use mpv for this but if you do

play18:16

need to interact with it

play18:18

you can just copy the url of whatever

play18:21

page you're on

play18:21

and then go to about profiles

play18:25

launch whichever profile you're going to

play18:27

use and you can name these however you

play18:29

want

play18:30

and open that up and then you can

play18:32

interact with that page

play18:34

using your signed in profile and

play18:37

you can take this a step further by

play18:39

purchasing

play18:40

a vpn and using specific

play18:44

servers with specific browser profiles

play18:47

uh for specific purposes and

play18:50

this would even prevent your isp from

play18:52

being able to link all of your different

play18:54

activities

play18:55

to your ip address that they give you

play18:58

and same goes for any government

play18:59

agencies that could subpoena your isp

play19:03

for the browsing records now

play19:06

keep in mind a vpn does

play19:09

not anonymize you all it does is

play19:12

shift the burden of privacy from your

play19:16

internet service provider to the vpn

play19:18

provider of your choice

play19:20

and for this reason it is very important

play19:23

to pick a vpn provider that

play19:26

is as secure and anonymous as possible

play19:29

and with these requirements your

play19:32

vpn of choice should be mulvad

play19:36

as far as i know they are the only one

play19:39

that is a log

play19:40

free vpn provider meaning that they

play19:42

don't really store

play19:43

any history of what you're doing on

play19:45

their service uh they don't have a

play19:47

history of selling user data

play19:50

and they also have a pay-by-cash option

play19:53

as well as the ability to

play19:55

create an account without giving up any

play19:57

user details

play19:59

um so you have to be very mindful though

play20:01

if you're going to

play20:02

go to this extreme not to mix your

play20:05

clearnet accounts

play20:07

meaning accounts that you created on

play20:09

your own ip address that your isp gives

play20:12

you

play20:13

and your vpn accounts uh for example if

play20:16

you created an account from your real ip

play20:18

address and then logged into it with

play20:20

your vpn

play20:21

when it's connected then those login

play20:24

details are going to be collected

play20:26

by the owner of whatever service the

play20:28

account belongs to you know take

play20:29

facebook as an example the time of day

play20:33

and the ip

play20:34

is going to be collected and now your

play20:36

real ip address

play20:37

and personal information that is

play20:39

connected to that account

play20:40

can then be connected to this vpn and

play20:44

all it takes is one server because uh

play20:47

like mulvade they offer you i think 600

play20:50

different servers

play20:51

and they're all going to have different

play20:52

ip addresses but

play20:55

you can figure out who an ip address

play20:58

belongs to

play20:58

fairly easily you know you can even tell

play21:01

uh what

play21:02

isps somebody is using you can tell

play21:05

whether it belongs to a vpn you know

play21:08

this is how

play21:09

uh online services or online websites

play21:12

they're able to ban entire ip ranges

play21:15

like if somebody is just

play21:17

abusing their platform over and over

play21:19

again then

play21:20

they'll ban the entire range of whatever

play21:22

vpn service they're using or isp they're

play21:24

using

play21:25

but the same thing can go for tracking

play21:27

you down and identifying you

play21:29

it just takes one slip up one server

play21:31

that gets connected

play21:33

to an account made with your real ip

play21:35

address

play21:36

and then the whole thing is essentially

play21:38

compromised they can say hey

play21:40

you know we know that john smith here he

play21:43

also uses

play21:44

mulvad we know that for a fact even

play21:46

though he paid in cash

play21:48

and he created it in an anonymous way

play21:50

without giving up any of his

play21:52

user details but as long as you avoid

play21:55

that

play21:56

and you create the vpn account in an

play21:59

anonymous way

play22:00

meaning that you do it over tor and you

play22:02

mail in

play22:03

a cash payment option for your account

play22:06

then

play22:07

you're going to be good now for

play22:09

situations where

play22:10

you truly need to browse anonymously you

play22:13

should resort to using tor

play22:15

but again just because you're using tor

play22:18

doesn't make you completely anonymous

play22:21

you should also

play22:22

block javascript as this can be used to

play22:25

reach

play22:25

through the three proxy hops of the tor

play22:27

network and grab your real ip address

play22:31

as well as hardware info about the

play22:32

computer that you're using

play22:34

which could uniquely identify you you

play22:37

also shouldn't use

play22:38

any accounts that are created on your

play22:40

public ip address

play22:42

especially the ones with your personal

play22:44

identifiable information

play22:46

because you've got the same problem as

play22:48

using it with your vpn

play22:50

those accounts they can easily link your

play22:51

personal information

play22:53

to the tor ip address that's in use at

play22:55

the time and then track

play22:57

all of the activity back to you um even

play22:59

things that go

play23:00

outside of that particular network like

play23:03

say you signed into your gmail

play23:06

over tor and then you go do a bunch of

play23:08

other stuff with that same ip address

play23:10

you're the only person in the world that

play23:13

is probably using that ip address at

play23:15

that specific time right like it can be

play23:18

it can really be narrowed down to you

play23:20

especially because there's not that many

play23:21

tor users out there

play23:24

that which is another thing you could do

play23:25

by the way to increase the effectiveness

play23:28

of the tor network itself

play23:29

is to spread this information let other

play23:32

people know about it because the more

play23:33

people that are actually using

play23:35

the tor network the more difficult it is

play23:38

for any one person to be identified

play23:40

on it and finally you should really just

play23:44

avoid

play23:45

online services that try to track you in

play23:48

the first place

play23:49

google facebook twitter they're all

play23:51

designed to track you

play23:53

every social media is purposefully

play23:55

designed to track you

play23:57

so it's very difficult to actually

play23:59

create

play24:00

and use these accounts especially when

play24:02

they require

play24:03

a phone number just to verify the

play24:05

account during sign

play24:06

up obviously your personal phone number

play24:09

is going to be out of the question for a

play24:11

private social media account

play24:14

but if you all are interested in finding

play24:16

out how to create

play24:18

these accounts anonymously that require

play24:20

phone verification

play24:21

let me know as the process to do so is a

play24:24

little convoluted

play24:26

to really do it correctly and it's

play24:28

likely going to require

play24:29

another video on its own there's also

play24:33

much more to be taken into account to

play24:35

really protect your online

play24:37

security like securing your home wi-fi

play24:40

securing your computers your smartphones

play24:43

and also how to just surf the internet

play24:46

without

play24:46

really revealing your identity so

play24:49

i've done brief coverage of these

play24:51

subjects already on my youtube channel

play24:53

but if you're interested in a deep dive

play24:56

into all of those subjects

play24:57

let me know and i'll make another longer

play25:00

video like this

play25:02

covering those different subjects but

play25:04

that's it for this one

play25:05

really glad you stayed to the end hope

play25:07

you enjoyed peace out

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
Privacy ProtectionData SecurityPassword ManagersAnonymous BrowsingDecentralized EmailEncryption ServicesVPN UsageTor NetworkAnti-TrackingOnline Anonymity