Shared February 25, 2019
You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content.
To learn how to best protect your online privacy in 2019 means to learn privacy by compartmentalization. Isolating your different digital identities and activities from each other is the best approach to keep control of your data.
Techlore's Go Incognito tutorial series:
How to be anonymous on the web
Master uBlock Origin in advanced mode
Important sources and software
Good intro into security approaches and compartmentalization https://theinvisiblethings.blogspot.c...
Every piece of software recommended is listed here:
More direct links:
Intro to QubesOS https://www.youtube.com/watch?v=dD0_g...
Joanna Rutkowska on Qubes https://www.youtube.com/watch?v=S0TVw...
Tor Browser https://www.torproject.org/
Tor for iOS https://blog.torproject.org/tor-heart...
Orbot on Android https://guardianproject.info/apps/orbot/
uBlock Origin https://addons.mozilla.org/en-US/fire...
- read the docs https://github.com/gorhill/uBlock/wik...
Cookie Autodelete https://addons.mozilla.org/en-US/fire...
HTTPS Everywhere https://addons.mozilla.org/en-US/fire...
Firefox Klar https://f-droid.org/en/packages/org.m...
K-9 email client for android https://k9mail.github.io/
How to get a burner phone https://theintercept.com/2017/02/20/h...
Privacy by compartmentalization is very simple. You will create virtual compartments where you concentrate carefully separated pools of data. Each compartment will revolve around a different sphere of your identity.
The more security you want, the stronger walls between your compartments you’ll build.
The first compartment is for your professional identity to separate your business email and work related activity from the rest of your online presence.
The second compartment is for your social media so that you keep those advertising giants away from your digital life outside of their platforms.
The third compartment is for your private identity where most of your light browsing, news reading, watching YouTube and making online purchases happen.
When you become familiar with this practice, you can build more compartments.
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
How to Disappear Completely
If you still have a Facebook account, delete it and stop using Facebook
This is how Google is spying on everything you do
World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote
I used the reasonably-secure Qubes OS for 6 months and survived - Matty McFatty [@themattymcfatty]
Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016
ONLINE PRIVACY: IT DOESN’T EXIST: Privacy and what we can do about it | Denelle Dixon | TEDxMarin
Why you are wrong about Universal Basic Income | The power of AI within the hands of the few
John McAfee: Dump Your Smartphone to Protect Privacy
The Good, Bad, and Ugly: NordVPN, ProtonVPN, IPVanish & More EXPOSED?!
Edward Snowden: How Your Cell Phone Spies on You
Libra - Zuckerberg's dangerous cryptocurrency lie
Best secure and private email services review - guide to Gmail alternatives and encrypted email
The VPN 14 EYES EXPLAINED! Should You Avoid Them?
Network Security 101: Full Workshop
How To DELETE Your Online Identity | Go Incognito 2.4
Ultimate smartphone security guide | How to secure your phone tutorial
The truth about Virtual Private Networks - Should you use a VPN?
How Do I Tails?: A Beginner's Guide to Anonymous Computing