How to be Invisible Online (and the hard truth about it)...

Don’t be fooled ... Occupy The Web (OTW) tells us the hard truth about being anonymous online. The brutal truth: Will using your neigbors wifi keep you anonymous? Can you hide from the NSA? Can you hide from Google and other companies? Will Tor help you? Will Proxy Chains help? Which phone do you need to use - Android or iPhone or something else? Which operating system - Windows, macOS or Linux? What is the truth? What do you need to use? // Mr Robot Playlist // // David’s SOCIAL // Discord: Twitter: Instagram: LinkedIn: Facebook: TikTok: @davidbombal YouTube: // Occupy The Web social // Twitter: // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW’s website: Direct links to courses: Pro Subscriber: 3 year deal: // Occupy The Web books // Linux Basics for Hackers: Getting Started Becoming a Master Hacker: Top Hacking Books you need to read: // Other books // The Linux Command Line: How Linux Works: The Car Hacker’s Handbook by Craig Smith: Hacking Connected Cars by Alissa Knight: // Occupy The Web Website / Hackers Arise Website // Website: OTW Mr Robot series: Want to learn more from Occupy the Web? You can join his classes using these links: Hacker’s Arise Pro Subscription for $ a month: Get 3 year’s access to all live courses for $750: // MY STUFF // // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@ // MENU // 00:00 - Coming up 00:51 - Don’t use the nighbour’s wifi 03:02 - OccupyTheWeb books 03:44 - How to remain anonymous on the internet // The NSA is watching 09:56 - Be careful of your browser 13:35 - Turn off cookies 15:41 - ProxyChains and Tor demo 22:10 - The FBI story 25:30 - ProxyChains and Tor demo continued 28:36 - How to remain anonymous 33:05 - Using Starlink 36:18 - Recommended operating systems 38:34 - Untraceable phones (burner phones) 40:05 - VPN vs Tor // Don’t trust free proxies 42:29 - Don’t keep systems together 44:24 - Recommended e-mail service 46:53 - Bitcoin is traceable 47:58 - Anti-forensics // How to clean systems 50:41 - Recommended search engines 51:34 - Have different identities/systems 52:26 - Conclusion tor proxy chains linux android iphone ios tails tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #wifi #iphone #android
Back to Top