Shared October 18, 2017
This is How to use uMatrix to protect your privacy online.
This uMatrix tutorial will teach you some basics about how to use this browser add-on to increase your online security, decrease bandwidth, and stop third party trackers from spying on your browsing history.
Learn about uMatrix scopes
Two ways to use uMatrix: block all / allow exceptionally; or allow all / block exceptionally
Walkthrough for first-time users
The Matrix cells
Examples of useful rulesets:
Umatrix is a point-and-click web content blocker. On this channel we mostly talk about protecting your privacy, which is how we are going to use this tool. But uMatrix is also extremely effective firewall that will stop a lot of malware, trackers, and malicious code from making their way into your device. And because it blocks a lot of unnecessary bloatware on websites, it will also save you significant amounts of bandwidth consumption.
Umatrix was built so that third party websites can’t snoop on your private information they shouldn’t have access to in the first place. Web developers can’t be trusted with their security and often times, even they don’t know how much they expose and leak your private data. And that goes for the big sites like Google and Facebook as well.
Let’s take control of our online privacy and security.
After you downloaded and installed uMatrix from your browser extension repository, the first step is to understand what it does. What’s great about this add-on is that you don’t have to understand everything. You can be as novice or as advanced with it as you want to be.
So first we are going to look at the interface and explain umatrix, then we’ll interact with it a little bit, we’ll go over some settings and then I’ll show you some tips & tricks that you may want to use.
Music: ‘Stuck’, ‘Memories’, ‘Walk’, ‘Time’ by https://www.youtube.com/user/CHUKImusic
Help us fight for our digital rights: https://act.eff.org/
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux
Edward Snowden: How Your Cell Phone Spies on You
The Original IBM PC 5150 - the story of the world's most influential computer
All Youtube Alternatives Are Horrible | Vidme, Bitchute, Minds, review
Nikola Tesla - Limitless Energy & the Pyramids of Egypt
"Social Engineering & Hacking in Action"
ONLINE PRIVACY: IT DOESN’T EXIST: Privacy and what we can do about it | Denelle Dixon | TEDxMarin
HOW TO get your CCNP in 2020 (no CCNA required)
6 evil lies about net neutrality that got it repealed | Complete history of net neutrality explained
15 Psychological Facts That Will Blow Your Mind!
What is a Virtual Private Network | How VPN works and why VPN is not all you need for privacy
How facial recognition advertising is becoming your new social contract
How to use uBlock Origin to protect your online privacy and security | uBlock Origin tutorial 2018
The truth about Virtual Private Networks - Should you use a VPN?
How Cambridge Analytica manipulated US election through 50 million Facebook users | Explanation