How To Become Invisible Online

  Переглядів 2,800,037

Hallden

Hallden

День тому

How To Browse The Internet Anonymously
The first 1000 people to use the link will get a free trial of Skillshare Premium Membership: skl.sh/kallehallden05211
Get access to my programming courses: / hallden
Follow me on instagram: / kallehallden
LiveCoder channel: / @livecoder7639
"Clean Code Friday"
If you want to receive one short email from me every week, where I go through a few of the most useful things I have explored and discovered this week. Things like; favourite apps, articles, podcasts, books, coding tips and tricks. Then feel free to join kalletech.com/cleancode/
CONTACT: contact@kalletech.com
Follow me on:
TWITCH: / kallehallden
INSTAGRAM: / kallehallden
TWITTER: / kallehallden
GITHUB: github.com/kallehallden
DISCORD: / discord
PATREON: / hallden
VIDEO EDITOR: editingmachine.com (use coupon code KALLE to get 50% off your first month)
--------------------------------------------------------------------------------------------------------
GEAR:
kalletech.com/tech/
00:00 intro
00:55 Level 1 Anonymity
03:33 System For Password Creation
05:53 System For Storing Passwords Safely
09:10 Restrict What You Reveal About Yourself
10:10 Create Multiple Emails
12:51 Level 2 Anonymity
12:59 How To Hide Yourself Online
14:48 How The Tor Web Browser Works
15:35 Use Encrypted Messaging
16:38 Become Invisible Online
17:37 The Tor Exit Node Problem
18:35 What is a Proxy?
19:18 Create Your Own Proxy
20:06 Become The Proxy
21:30 Creating An Anonymous Gmail Account
23:07 Conclusion
This video was sponsored by Skillshare

КОМЕНТАРІ: 2 600
@Hallden_
@Hallden_ Рік тому
Here is my other channel with nature related content: youtube.com/@halldenlogs3445
@sumrandomguy4860
@sumrandomguy4860 Рік тому
Hey, I got a quick question. Does it make sense to use both a VPN and Tor browser at the same time?
@mrcx6142
@mrcx6142 Рік тому
My issue with password managers is always - how secure are they? If they get busted, all of my passwords are, that's my thought process.
@darkones4370
@darkones4370 Рік тому
@XfxPro650W heard the same before. Is Mac better overall?
@Plastik13
@Plastik13 Рік тому
@@sumrandomguy4860 VPN is worthing 0 because if the VPN company gets served with a warrant, they will have to comply and give your own personal IP address.
@deadlyhacker991isback
@deadlyhacker991isback Рік тому
youtube.com/@deadlyhacker991isback
@removedaccount6863
@removedaccount6863 3 роки тому
He didn't only tell us how to be anonymous. He also taught us the basics to be safe on the internet that most of the people don't know about.
@kenshin5727
@kenshin5727 3 роки тому
HAIII BABUNIII YOU ARE RIGHT
@removedaccount6863
@removedaccount6863 3 роки тому
@@abhisheksathe123 I just kept it Short Brother. You should understand it. Overall tryna act cool is not good bro. I know what the title says. I ain't high. And I ain't telling something bad brother. Thank you.
@removedaccount6863
@removedaccount6863 3 роки тому
@@kenshin5727 Awww Honey bun amal babuni taa!! ALIGATOUUU!!
@removedaccount6863
@removedaccount6863 3 роки тому
@thefallenshadow why you ask? Yeah obviously
@69axfahmid82
@69axfahmid82 3 роки тому
@@abhisheksathe123 STFU
@engboy69
@engboy69 3 роки тому
Now I can be as invisible on the internet as I was in high school
@gorg212
@gorg212 3 роки тому
Lol
@minineji7050
@minineji7050 3 роки тому
Lmao
@Hallden_
@Hallden_ 3 роки тому
Hahah nice
@Solitudal
@Solitudal 3 роки тому
ouch, this cuts deep
@kailuhamichalakis3797
@kailuhamichalakis3797 2 роки тому
Oh dude how I feel you on this
@ethanpatrick
@ethanpatrick Рік тому
"I can remain unseen if I wish, but to disappear entirely: That is a rare gift." - Aragorn
@wakeupuk3860
@wakeupuk3860 2 роки тому
Been in IT since 1982 and in theory this is an excellent video and I commend Kalle for doing so especially unlike a good deal of IT UKpostsrs on here, who mainly want to show off, get attention and aim for sponsorship plus he does not hide it requires having the knowledge, effort and time to do so. Unfortunately as is with so many IT professionals I taught in my time, simply can't grasp that non IT people just want to 'use' IT to do what they want, as oppose spending additional time and effort in being able to do so. That is why even though we have so many utilities and techniques to make passwords more secure, people as I even do (and I used to teach security) now keep a small book with them all written down as we have to change them on an irregular basis. Just like a neighbour I once had, who never actually used his car (driving his wife mad) as he was always tinkering with it, in his garage, to make it run better. The other thing is that most users who wish to use all the aspects of the Internet now find to do so, have to abide by the rules, wishes and requirements that are for the benefit of the provider not the user. A classic example is how banks have totally reversed the relationship, where once customer was king to them now. Kalle's suggestions are valid but most major websites know this and have paid IT software and hardware developers to creat 'hoops' that we must jump through to use them which if you have sensibly carried out what Kalle has stated you 'AIN'T GETTING IN'.
@jum5238
@jum5238 Рік тому
There's another couple of aspects he doesn't cover. Tracking by apps, and cross-correlation of your information with other people. For instance, how many people have your phone number, and have entered it into their phone listings? And do they have utilities and apps that they use to make their lives easier and allow them to share their phonebooks with them? Or their contact lists for email? What about apps that you may have in common with your burner phone and your normal phone, despite not having them on in close proximity to one another? Oh yeah, there's also an algorithm that is used by intelligence services that correlate one phone turning off and another one turning on in close proxmity both spacially and temporally (time). And what about patterns in common? Do you have a group of sites you like to visit and are used on each phone/computer? Would your browsing history get scraped by malware? Do you pay bills online for utilities locally near you? Have you noticed that credit card transactions require phone numbers? And license plate readers and facial recognition, as well as gait tracing (the way you walk) can be used to identify you under a ubiquitous surveillance environment. Some interesting concepts covered in the show "Person of Interest" where the surveillance of everyone is a goal by intelligence agencies.
@justanotherhuman3668
@justanotherhuman3668 Рік тому
@@jum5238 how would you get around that?
@Skaggs666
@Skaggs666 Рік тому
@@justanotherhuman3668 here's what I've (hypothetically would) have done over the years to avoid those exact techniques @Ju M mentioned: my phone had a pretty predictable pattern. At 10PM it would enter quiet mode and that silenced notifications and I'd typically put on a UFO doc to fall asleep to. So from the outside looking in, I was asleep. I always used burner laptops/phones/hotspots to conduct business and swapped them out frequently. Laptop had Tails (no Windows/MacOS/etc). I never downloaded Tails from a machine or browser account linked to me and always used a fresh download on a new USB every time I swapped laptops. Some will say that is overkill. I would retort that person never took a 500-600 computer forensics course. Business was always conducted during sleep mode and I left my smartphone at home and went to truck stops (Flying J, Loves, TA, etc). My burner never got turned on until I arrived. Obviously I was using TOR unless the latency was too much for what I was doing at the time was rare but did happen. I'd never stay longer than 2 hours even if I wasn't done. I'd go to the next truck stop if time ran out. I went to well traveled truck stops, ones that were busy all night long. The more crowded the better. I had a coin and dodecahedron (D12) dice that I'd flip/roll to determine which of the 24 truck stops I frequented within 150 mi of my house I'd be going to. Heads was the number on the die, tails was 2x the number. I did that so no pattern could emerge and I never went inside to buy anything or go to the bathroom nor did I buy gas. All the BTC I used came from Local Bitcoins (RIP). This was long before Monero. Before BTC, it was forums like Shadow Crew and trust lol. Hypothetically.
@netsaosa4973
@netsaosa4973 Рік тому
?
@smokeygaming3565
@smokeygaming3565 3 місяці тому
Yip yap i aint readin allat
@primorock8141
@primorock8141 3 роки тому
This video went from basic internet safety to getting away as a crime boss real quick...and I like it!
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@thahrimdon
@thahrimdon Рік тому
@@satoshinakamoto7253 Tails is the GOAT one of those things where if you know, you know
@weikopan2036
@weikopan2036 Рік тому
Wait ! you forgeted tor and proxy server
@Mikey-yo9ue
@Mikey-yo9ue Рік тому
@@thahrimdon that’s the one with flash drive?
@thahrimdon
@thahrimdon Рік тому
@@Mikey-yo9ue Yessir, a lot of them are usually with removable media but you are correct.
@mikeoxlong4043
@mikeoxlong4043 3 роки тому
Plot twist: he is a government agent making it easier to track us
@RS-xx8gz
@RS-xx8gz 2 роки тому
It is
@Drake-E
@Drake-E 2 роки тому
duh
@TooooooooooNify
@TooooooooooNify 2 роки тому
he didn't even like your comment like everyone else that made it to the top. you might be onto something.
@theencryptedpartition4633
@theencryptedpartition4633 2 роки тому
You gotta go to China or Singapore or Hong Kong and wear mask, and you will just look like anyone on the street. No racism, just saying. I am Asian myself. When I wear Clark Kent Glasses, no one recognizes me and some mistake me with other person.
@mukulsharma5738
@mukulsharma5738 2 роки тому
no he isn't ..but looks like you are ..now that's a good plot twist!~!
@Mohammad_Ali__
@Mohammad_Ali__ 2 роки тому
It is tough to prevent data being tracked and hide info. Literally just whatever it may be related to the person (especially personal information) that is used for any purpose can blow one’s personal information and status. So far this is the best video I’ve seen and one of the many that is useful which I learned from.
@Dre_GadgetCravesNmore
@Dre_GadgetCravesNmore Рік тому
Am not gonna lie, i sat and watched this whole video and this guy spoken everything pertaining to becoming truly invisible online. He didn't miss anything out, this is literally the sauce explained yo👏🏼👏🏼👏🏼 well fu*king done❗️
@ariannagaskins2306
@ariannagaskins2306 3 роки тому
Just wanna say I appreciate that Kalle keeps in a lot more of his verbal mistakes and even jokes about them at times. Definitely makes him a lot more personable and he comes off a lot more relaxed. He’s come a long way!
@carlivasquez6840
@carlivasquez6840 2 роки тому
@willjackson4596
@willjackson4596 2 роки тому
@Clinton Shaun what the fuck
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@Concise_Parakeet
@Concise_Parakeet Рік тому
@@willjackson4596 It's a bot
@Concise_Parakeet
@Concise_Parakeet Рік тому
@Clinton Shaun bot
@user-ew5vj1sl1u
@user-ew5vj1sl1u 3 роки тому
Wow, multiple book level knowledge condenced into a 24 min video. Absolute legend.
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@Void_from_Abyss
@Void_from_Abyss Рік тому
@@satoshinakamoto7253 what are they? Please briefly explain
@ABC-jq7ve
@ABC-jq7ve Рік тому
You’re spelling your name wrong in Japanese. You need a う after the りゅ if you want your name to say “Ryu”. Also note, using hiragana will make you look more like a preschool child or a teenage girl than an adult. But if you make it kanji, the Hayabusa part is already kind of cringey, so it will make it look even more cringe. I’m Japanese. You’re welcome.
@SADS-hm3qe
@SADS-hm3qe 8 місяців тому
wtf@@ABC-jq7ve
@3dinterface68
@3dinterface68 Рік тому
Couple things not mentioned is to shut off your telemetry data inside your OS. Normally a stealth system requires this and should read "Your system has achieved a perfect "TruStealth" rating. Not a single packet - solicited or otherwise - was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice." You can also shut off netbios over tcpip in your adapter settings so you are not broadcasting, and hiding your ssid so you are not broadcasting your connections name through wifi discovery.
@seekthuth2817
@seekthuth2817 Рік тому
Extra added layer of security you can add to your passwords is to have your passwords in a foreign language, like Spanish or (romanized) Chinese. The further from your mother tongue and the less popular, the better. Good example is to find a band like The Hu that sings something like Mongolian, use a romanized version of a line from one of their songs, and then encrypt it.
@MTyler8787
@MTyler8787 Рік тому
I wonder what this guy’s password is..
@what.anything
@what.anything Рік тому
that's a good idea sadly most sites allow only english.
@seekthuth2817
@seekthuth2817 Рік тому
@@what.anything Yeah, that's... that's why I said use a romanization of your specific language. I'd be shocked if a website allows you to use 咖啡因眼淚 as a password, but you can just use the pinyin for it, "kafei yin yanlei" and then encrypt it by changing like the K, and the N's to like a 7 and some #'s. Can do this with basically anything you want to just by going to Google translate (its inaccuracy being a benefit here) and writing down the Roman letters it puts for the pronunciation aid. It's super easy, though I would recommend putting it on a piece of paper just in case Google fixes a blunder it made that just so happens to Thanos snap your password out of existence.
@ShinyEmeraldGames
@ShinyEmeraldGames 3 роки тому
Really great and helpful video. Online anonymity has become more and more important for me over the last couple of months.
@Hallden_
@Hallden_ 3 роки тому
Thank you! Appreciate it!
@helgin_lol
@helgin_lol 2 роки тому
@@kallehalldenassistant7578 lol
@qzxsounds123qzx4
@qzxsounds123qzx4 2 роки тому
@lafondawilliams
@lafondawilliams 2 роки тому
months try years
@SavathunSussyImpostor
@SavathunSussyImpostor 2 роки тому
@@kallehalldenassistant7578 Scam call center 👀
@AwokenEntertainment
@AwokenEntertainment 2 роки тому
It's crazy how much privacy people give up for convenience..
@silentking5080
@silentking5080 2 роки тому
Not really i don’t care if business have my information they have millions of others also I’m not some dark web hacker so I don’t need that much privacy
@atroxiv
@atroxiv 2 роки тому
Yeah bluntly speaking I don't care if someone knows my name/ where I live as long as they 1) obtained that information from me. 2) are not freely giving it out / selling it. 3) have it stored in a secure manner.
@kon6492
@kon6492 2 роки тому
@@atroxiv but they are not safely stored and are selling it
@atroxiv
@atroxiv 2 роки тому
@@kon6492 Most of them safely store it, I dont give it to those that have a history of breaches etc. And I also dont give sensitive information to companies that dont promise to not sell it.
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@mht5875
@mht5875 Рік тому
It is so important to police yourself online - never use your real name anywhere, never post a photo of yourself, never give out your exact location. If you use social media, again, use a "sounds like a real name", keep everything turned to Private.
@mikeoxweld8604
@mikeoxweld8604 Рік тому
Nice upload, succinct yet easy to follow.... Highly recommended for anyone else with a short attention span or others who may have naively spent years feeling they have nothing to hide.... subsequently allowing many years of social-media voyeurism erode any belief in, or concerns for online privacy in 2022. Much appreciated!
@giosaia
@giosaia 3 роки тому
10 year olds that feel like being a hacker would be awsome be watching this vid over and over. 😂
@RohakGaming
@RohakGaming 2 роки тому
@@kallehalldenassistant7578 didnt ask dont care
@chinayo9022
@chinayo9022 2 роки тому
Awsome
@jurivjerdha2467
@jurivjerdha2467 2 роки тому
@@RohakGaming with that profile pic the only thing you do is ask and care for other peoples stuff
@RohakGaming
@RohakGaming 2 роки тому
@@jurivjerdha2467 it was a bot who was promoting a fake scam link. Would you not say anything?
@jurivjerdha2467
@jurivjerdha2467 2 роки тому
@@RohakGaming oh now that i reread who you @ and how his comment isn't available it makws sense. Thought you said "didnt ask dont care" to the first main comment .
@Hungrymage
@Hungrymage 2 роки тому
I used a password system where you think of a word and just add the date of that day in front and the state you're in(as in drunk, happy, sober, etc). This worked for me so far
@Cardboardbox83
@Cardboardbox83 10 місяців тому
I REALLY LOVE this video, explains everything I’ve really wanted to know and extra I didn’t even think about
@markksantos
@markksantos 2 роки тому
Can you show us how to remove ourselves from all these websites that show your address, phone number etc...?
@Brukrex
@Brukrex 2 роки тому
Impossible
@TaioCruizeVEVO
@TaioCruizeVEVO 2 роки тому
unless your name is Harold Finch you will not be able to do it ;)
@jovan0454
@jovan0454 2 роки тому
Don't give them that information
@MaoYu23
@MaoYu23 2 роки тому
You have to do it one by one, it's not easy, but it's possible, i did it and i feel so free now !
@xE92vD
@xE92vD 2 роки тому
You can issue a case if the website put your personal information without your permission
@andreagualandris2462
@andreagualandris2462 3 роки тому
really great video as always! I love how you trigger the interest with some general interesting thumbnail and proceed to explain it in detail in the video. Keep up the good work man! Love from Italy
@kallehalldenassistant7578
@kallehalldenassistant7578 2 роки тому
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,...... ,,,,,
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@jenniferroth1196
@jenniferroth1196 Рік тому
Unsurprisingly it ends up like Kevin Mitnick's: The Art of Invisibility. Well done! Hope to see more of this well presented content.
@d.Cog420
@d.Cog420 Рік тому
A couple of other ways: post letters; communicate with people by going to see them; shop by going to local stores; bank by going to the bank (if there are any left); grow what you can (salad stuff is easy and you can even grow it in an apartment); slow ourselves down, get off the click-shop, rebuild communities. Get on two wheels to move around: scooter for short distance, then pushbike, e-bike, motorbike. All good for the planet and us (careful on the motorbike). The internet has only been around for a tiny amount of time yet we now spend all our time on it (like me now). We could try getting out a bit more. Might be good for our mental health too as well as physical. For all internet uses though, do what Hallden says.
@internetgurutv
@internetgurutv 2 роки тому
No one is safe online.. But good thing there are online angels like you. Thanks for sharing these tips 😊👍
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@thehariskhan
@thehariskhan 2 роки тому
You taught us the whole thing to be anonymous. Your all videos, vlogs are amazing 😍. I'm in love with your content.
@ybsparky8484
@ybsparky8484 2 роки тому
Amazing video, very well put together. Keep it up :)
@leesweets4110
@leesweets4110 Рік тому
I used to do my passwords like you describe. I had a handwritten list of 1/3-passwords for every site or service. Another 1/3 of the password was derived from the hostname or domain name of the site, and the last 1/3 of the password was a constant I had memorized. I had a mental algorithm for mixing them together. Then I found a better way. I just had raw passwords written down for each site. I would then truncate its 256 bit hash down to size, and use that as a high entropy "random" alphanumeric password. Then I discovered offline password manager. Their database is encrypted with a main password (which I handled as before). But each sites individual passwords contained therein were randomly generated ascii passwords. They also store TOTP keys to generate 2FA codes as an authenticator app. They also store direct url links so phishing becomes an impossibility; never sign in through any link other than the one you stored in the manager. You can also get creative and have an independent, memorized password (just a character or two) that you can prefix to the password stored in the manager. Ive even encrypted my entire password manager into a veracrypt volume.
@mohamedirfan2816
@mohamedirfan2816 3 роки тому
Analogies are on an another level 🔥
@freezbreez8731
@freezbreez8731 2 роки тому
This Is The Man I Have Been Searching To Mentor Me. Hail Kalle Hallden🙌🏼🖤
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@bringbackdislikes3195
@bringbackdislikes3195 2 роки тому
@@satoshinakamoto7253 Shut up
@AUSTINREAL-gk7xc
@AUSTINREAL-gk7xc Місяць тому
I needed the part three of your video . Thank you soooo much
@Cobra-yo7fx
@Cobra-yo7fx 2 роки тому
I found this channel and this video from the main page of UKposts on the safari version on my iPad Pro! Nice video!
@MisterL2_yt
@MisterL2_yt 2 роки тому
2:10 they also track stuff you don't allow them to track explicitly, via their integration and data sales with other companies
@lyfandeth
@lyfandeth 2 роки тому
Using the plus symbol + for concatenation in email addresses IS actually formally part of the standards, making it easy to create one purpose email addresses. But major ISPs like Goggle will reject these. Goggle also ignores using a period . as a separator despite that also being a required standard.
@wojtekpolska1013
@wojtekpolska1013 Рік тому
what are you talking about? first of all, Google is not and never was an ISP, second, they absolutely do allow you to use the + character in gmail, so idk what are you talking about
@mineatomtr
@mineatomtr Рік тому
@@wojtekpolska1013 he said Goggle not google bruh 🥶💀 when blindness intensifies 💀💀💀💀
@fridaber6069
@fridaber6069 2 роки тому
Finally a video that even I, a non-IT-expert, could understand.
@JeffriAbdullah
@JeffriAbdullah 2 роки тому
Fantastic video Kalle - keep doing the ice baths they put you on fire!! I have always wondered about how to do this.
@GKNaidu-hb5zv
@GKNaidu-hb5zv 3 роки тому
you should definitely make a video on setting up a proxy by ourselves at public wi-fi's..like starbuck,stations,etc...
@micropanda7916
@micropanda7916 2 роки тому
@@kallehalldenassistant7578 Lmao you seriously try to lure people into scam using channel that is about tech? (I mean, u probably won't answer cus it's bot but still lmao)
@aguiar.8181
@aguiar.8181 2 роки тому
@@micropanda7916 ?
@aguiar.8181
@aguiar.8181 2 роки тому
@@micropanda7916 just because someone doesn't have any videos doesn't make them a bot...
@warzone2620
@warzone2620 2 роки тому
@@happystarthe3rd hm not really u can just duel boot kali or whatever os u want. its what I do
@happystarthe3rd
@happystarthe3rd 2 роки тому
@@warzone2620 Yeah but for people new to this stuff is probably scarier and they feel safer using a virtual machine
@CR4T3Z
@CR4T3Z 2 роки тому
No caps, no numbers, 6 digits 13 year old password, still works to this day and never rest And it's such a simple word
@Hallden_
@Hallden_ 3 роки тому
Hope you like the video! Been researching this topic for a while now. Also feel free to leave a comment if you know of better ways to do anything that I said or if I missed something! That’s just really useful if !subscribed: print(”What are you even doing mate, subscribeee”) subscribe() else: print(”Heyyo”)
@domzymonz
@domzymonz 3 роки тому
Heyyo!
@RandomGuy-ws8cy
@RandomGuy-ws8cy 3 роки тому
Heyyo
@KB-pk5ze
@KB-pk5ze 3 роки тому
Heyyo
@marcv610
@marcv610 3 роки тому
Heyyo
@marcv610
@marcv610 3 роки тому
@HotBBQSauce you can do that ?
@derpo6396
@derpo6396 Рік тому
Another way to save your password is saving it inside of an image on another device, this allows you to use a very complex password. While being pretty safe to use.
@DieStockEnte
@DieStockEnte 3 роки тому
I use hash encrypted passwords. For example I want to use "the final countdown" as password, then I encode it with sha512 or sha256. Then get a long hash and I use it as password. Only I know the "real password", which I am easily able to remember and to encode with sha512/256 to the password I use on web. Cool video! 👍🏻
@dhay3982
@dhay3982 2 роки тому
That means that your password is "real password" + "fake password" + your encryption algorithm. Not bad, because some hacker would need to put 3 unrelated info together to break the security.
@netautorisationnetautorisa545
@netautorisationnetautorisa545 2 роки тому
​@@dhay3982 *WE DO NOTHING !!! THE PC DO 99% OF "DECHIPER"* *EVERY PASSWORD IS A JOKE* *EVERY PIN IS A JOKE* *THERE IS **#NONE** SAFE THING ON A "COMPUTER" ...OK* *THE POINT IS ....* *DO NOT WRITE "ANYTHING" ON "COMPUTER* *...... WHO CAN GET YOU SELF KILLED .......* or *...... CAN GET YOU #30 YEARS IN **#JAIL** ....* *(NEVER ..OK !!)* *THIS IS THE "ONLY" 2 THINGs TO **#REMEMBER** !! FOR LIFE* AND I KNOW A "LITTLE" ... ABOUT #IT .... oooh WHAT is .....this .!!.. (clash of clans) (club penguin) (no end) HAVE A GOOD DAY ... YOU
@farhanjarif503
@farhanjarif503 2 роки тому
Extremely complicated passwords need to have more time to decipher, nevertheless the hacking never stops.
@pablochocobar074
@pablochocobar074 2 роки тому
@@netautorisationnetautorisa545 **CAN you EXPLAIN me why you WROTE** it like that? And why did you **put** random names in **THE end**
@brazy5006
@brazy5006 2 роки тому
The better advice would be use strong passwords + MFA, and you're almost impossible to hack if you use your brain a bit.
@sandy7m
@sandy7m 2 роки тому
Liked the video. The password creation system was good. I was taught a system many many years ago. Name Number symbol(s) First step is choose four names. They can be a name of anyone you know preferably, the first names of Grandparents or Aunts or Uncles or long lived pets like cats or dogs. The names must be at least 6 character's or longer each Look at the four names and notice which letters are common between the four. Each name must have at least one character common to the two we will choose (for example the letter O or E) If one of these names does not fulfill this rule then find another name. With all four names you have the first part done. Second step - Pick four numbers you can remember They will represent the year and month that someone was born that is in your family network. Look at the four numbers and notice which characters are common between the four numbers such that each number has at least one character (for example the number 3 or 2) Third step - Choose two special characters. Pick ones that are in the same place with the most common types of keyboard that you will use. In this example we will have ? and > Avoid using things like full stops and commas as they are difficult to see Next you need to establish a substituion rule for the characters so you can disguise the passwords. For my example I will choose - o and 3 and ? will be replaced by ** e and 2 and > will be replaced by == Always use two or three substitution characters together. Never just the one. I now keep a small notepad with the four names and four numbers. But use the disguise substitiutions in those names and numbers when writing them down. When a password is created it will always consist of the name first, followed by the number with the special character(s) at the end. Now we will say that we have made up a password from my grandad's name and my fathers birthday with the special character ? from my choices Fredrick0259? On the website I will enter Fredrick0259? To keep a record of this I would write Fr==drick0==59** Now, if anyone comes across Fr==drick0==59** in my house, work (or on my phone) they do not have the actual password. You will need to create at least two passwords. The first one is for social uses such as email and Facebook. The second one is for cash websites such as paypal or banking. Once a year I change out the passwords. Although I have gone longer. The names and numbers are writen in a small notepad. I also keep a copy of this in my phone. The special characters are kept in my head This notepad will also have the old passwords in case I forget to change out a password for a site after not having been their for years. To create a new passsowrd I pick another name from the list and a number (they are chose at random). Then choose the special character(s) to end it. The final trick with this system is that I can create shorcuts on my PC with the name editied to include the disguised password to act as a hint. The shortcut might be labelled as My Gmail - Fr==drick0==59** With these shortcuts copied to a memory stick I can have online access at any PC with the passwords easily to hand. I have been using this system now for nearly 15 years. The same four names and numbers. Once you get used to it there is no need to worry about remembering passwords current or way in the past. To show how well this works - Using the example above. What is Ge**rge0==64**== It is worthwhile noting that this whole system can be reversed and still achieve the required list of passwords and maintain security. You would now write the undisguised passwords in your notepad and on your shortcuts. The disguised passwords would now be used at the website.
@marilynnelson4718
@marilynnelson4718 Рік тому
Looks good but Fredrick and George can easily be deciphered . Guessing 1 number easy. Yeah, the question mark - they’re able to run info quickly. I think you were lucky you didn’t get hacked…. Right direction- just need more.
@thesilentgeneration
@thesilentgeneration Рік тому
For those of us living in certain countries like the Philippines for instance, using Tor trades hard tracking for slow speed. Not all of us have the bandwidth to use Tor without being slowed down to nearly nothing.
@zajlord2930
@zajlord2930 2 роки тому
i mean the last level could be used against some creeps from like darkweb or someone you made mad. For example if you knife someone in csgo he wont be able to trace your home
@Sarahhh123
@Sarahhh123 2 роки тому
not csgo lol
@bringbackdislikes3195
@bringbackdislikes3195 2 роки тому
When you type "gg, close" when you destroyed them 16-0
@jamescarter5466
@jamescarter5466 3 роки тому
I've had a crap week, but you saying "visable" is just making me smile, this is why I love your content !
@Xizax41325
@Xizax41325 Рік тому
I do the email one kind of. I have a variety of emails for various things that all forward to my actual email. Not entirely secure since if someone gets into one of the sub emails they'll be able to see where it is forwarding to but it also means that if something gets compromised I can just drop that email, make a new one, and set it back up. Its also handy for when they get flooded with spam and stuff from subscriptions/newsletters.
@domwick720
@domwick720 Рік тому
informative and nuanced did his research and gave layers of op sec- good vid
@zelrius8714
@zelrius8714 2 роки тому
I'm constantly trying to keep myself private bc i've encountered ppl who hacked and it's scary tbh. The good thing is I've done most of these things, and I started doing multiple email thing since last year. However, I do only use one mainly even though I have multiple, so I should really fix that. I really need to try what he said about creating an email for shopping and one for personal so that it's separated, that's smart ngl.
@ayva1106
@ayva1106 2 роки тому
When I make really long random passwords I just memorize the rythm of movement that I make when I'm typing the password out. I don't know half of my actual passwords but I know the hand movements for them :)
@LakadMatatag2702
@LakadMatatag2702 2 роки тому
The problem is if you don't access that site regularly then you can't have muscle memory for that site, so you may forget the password of a site that you haven't accessed for years.
@ayva1106
@ayva1106 2 роки тому
@@LakadMatatag2702you'd be surprised... I've recently logged into an account that I hadn't touched in two years and I typed the password as if I had been doing it every day. Muscle memory lasts a long time 😌
@darkenedvision4709
@darkenedvision4709 Рік тому
good for you, not everyone is that kind of mutant. I work construction and go hiking in my free time. I don't have time for all that craziness.
@wisniapilkarski
@wisniapilkarski Рік тому
I have never seen such a professional and transparent video in my life
@collinloretitsch4731
@collinloretitsch4731 2 роки тому
Daammmnnn!!! Awesome video!!! This must be the dude behind the scenes running "silk road". Lol....seriously though. Great video
@rbq426
@rbq426 3 роки тому
Wow, I'm overwhelmed and impressed!! Thank you
@kallehalldenassistant7578
@kallehalldenassistant7578 2 роки тому
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,,,.......,,,,,
@MaxMitchell
@MaxMitchell 3 роки тому
I really like this new format of videos you've been doing (like the NFT video) - while they're longer they're also a lot more informative and I feel like I've learned something after watching.
@kallehalldenassistant7578
@kallehalldenassistant7578 2 роки тому
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,.....,,,,
@rickastley-729
@rickastley-729 2 роки тому
@@kallehalldenassistant7578 Thank You Assistant! 🙏
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@joojlejoojle1438
@joojlejoojle1438 2 роки тому
The video is great! Just want to add that you can create Gmail accounts without phone number. On signup on a new (or after factory reset) Android device, while setting up, you can create a gmail ID without giving a phone number. Also temporary disposable email accounts can be of great help where you only need to create account and use only once
@ahmed-osama2022
@ahmed-osama2022 Рік тому
Great video, and Everything is very great, the explaination, the Editing of the video and everything, thanks a lot from Egypt
@jewelflores4105
@jewelflores4105 3 роки тому
I'll try the multiple email and longer password, thanks Kalle 🙂
@Hallden_
@Hallden_ 3 роки тому
Yeah highly recommend it!
@jumpergamer1913
@jumpergamer1913 2 роки тому
@@Hallden_ thanks for the video, now i can commit war crimes
@koranhama4837
@koranhama4837 2 роки тому
@@jumpergamer1913 go ahead comrade
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@Chad_Fishy
@Chad_Fishy 2 роки тому
Let's be real if you clicked this video you need to apply these skills immediately, cuz your getting put on a list after clicking this video
@zanetbutane8742
@zanetbutane8742 2 роки тому
lol its a joke but its also not a joke. I've been coming across so many other serious issues that have that same affect. My fault you didn't even say it was a joke - I guess its just the idea that many people will read your comment and assume it is a joke
@OneNamelessHero
@OneNamelessHero Рік тому
Yamete kudasai FBI agent~kun
@guruoo
@guruoo Рік тому
I like your layered approach to online opsec.
@daedaluxs
@daedaluxs 2 роки тому
Cool lil thing for emails, you can sign in with all your emails on mobile (up to like 10), and search all inboxes when looking for something.
@SulaimanBotha
@SulaimanBotha 3 роки тому
I see you're experimenting with longer form content...I'm not complaining though😂
@kallehalldenassistant7578
@kallehalldenassistant7578 2 роки тому
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}......
@brandonhughes645
@brandonhughes645 2 роки тому
I would just add being aware of threats and always looking for them. Obviously phishing attacks are very popular atm. We done a phishing test on our workplace and far too many people clicked the links.
@ravenjoker254
@ravenjoker254 Рік тому
I'm glad to see I already do most of the Tier 1 security! the emails weren't even for security, it really really helps keeping a clean inbox to have separate emails for separate thinga. never again will this personal email get buried under shipping notifications!
@CloudySheets
@CloudySheets 2 роки тому
Could you make a video about erasing your online identity? Like the process and steps it would take to delete as much info about yourself that on the web available so its easier to become invisible without much worries
@HimanshuYadav-nt9zp
@HimanshuYadav-nt9zp 3 роки тому
Every time I watch your videos, don't know why I feel next video will be music production video😅 such a versatile guy
@kallehalldenassistant7578
@kallehalldenassistant7578 2 роки тому
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}.......,,,,,,
@BenKenobi123
@BenKenobi123 4 місяці тому
As you have mentioned the trade-offs of enhancing security at the expense of user experience is what will keep people away from these practices. I find myself in that group of people because I want a good time and I have nothing to hide. Anyways, I do use a password manager (because it’s just easier) and a vpn (to get content from the other side of the world). Thank you for the suggestion about multiple emails I could use it for separation of concerns purposes
@juancarlosvaleron4850
@juancarlosvaleron4850 Рік тому
It's so funny. Digital is now so cumbersome I need to go back to my paper notebook to store all my data. Thank you digital revolution!
@SamarthCat
@SamarthCat 2 роки тому
To create your own proxy you can rent a VPS server somewhere in the cloud and all your internet traffic will appear as if it came from that VPS server.
@TsukiNoInu93
@TsukiNoInu93 2 місяці тому
yeah, but how will you pay for that? 99% of online banking require passports these days
@joestephani7959
@joestephani7959 2 роки тому
I upvoted because you mentioned the final countdown
@Jxhsxn
@Jxhsxn 10 місяців тому
What we see: How to become invisible online What hackers see: How to track invisible people online
@StonedNoob
@StonedNoob 2 роки тому
This went from 0 to 100 real quick 😂 Like from tips to be secure on the net to outright being a cyber criminal. Like tips on how hide your face and stuff lmao
@atroxiv
@atroxiv 2 роки тому
Hide your face, steal bandwidth and power from the local starbucks et al.
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@chichung888
@chichung888 Рік тому
One of the biggest problems for remaining private is Hardware,Software,Program,File,Data Fingerprinting. Giving misinformation is the best way but it's getting harder to do, if you have not already done this like 12 years ago then it's to late now. If your face is not on line now then put it on line, after you have tweaked you picture so it still looks like you but AI cannot match it to you. You need to put out your misinformation as soon as possible so it's accepted as you, then when it securely given without you consent to others it's then accepted as you and gets imbedded as you in the system. Then until your misinformation is 100% removed from the systems so it cannot be auto replaced by any system you are a lot safer. It's way better to hide in the crowd than hide on your own, It's only secrete if no one else knows.
@leroy3086
@leroy3086 5 місяців тому
You try to hide, they try to find, like a snake bites it's tail "how to completely disappear a drop of water? Dropping it into the Ocean"
@booyakabambata
@booyakabambata Рік тому
Dude, THANK YOU. What a great video. This should be mandatory viewing and taught in schools.
@beforedrrdpr
@beforedrrdpr Рік тому
this is not such great of a deal that it needs to be taught in school, but rather 'safety in online' should be
@nyudoragon1478
@nyudoragon1478 9 місяців тому
​@@beforedrrdprthen go teach ppl
@beforedrrdpr
@beforedrrdpr 9 місяців тому
@@nyudoragon1478 i am clearly not expert in that field
@ruizongge3432
@ruizongge3432 Рік тому
man, doing a research for my comic. now my brain is burning from all of that information.
@yvsh
@yvsh 3 роки тому
Snowden: *takes notes
@dexterflodstrom9975
@dexterflodstrom9975 Рік тому
Great video as always! I'd like to add to the email part in that Simplemail can be used to create email aliases, which essentially allows you to create "new" emails that people can send mail to, but it will get forwarded to your actual email address, thus allowing you to in reality still only manage one email. Gmail has this built in as well I believe.
@theheinzification
@theheinzification Рік тому
No, Microsoft (outlook) has.
@moltopericoloso
@moltopericoloso Рік тому
Firefox has Firefox Relay now, user created "burner" email aliases that forward to an actual email address. You can one-time use aliases as and when required or keep some standard ones e.g. one for shopping, one for extortion, two for porn, etc. ;-)
@slax8679
@slax8679 Рік тому
great alternative to the whole password situation locked case + pen and paper
@chaffejcarraway
@chaffejcarraway Рік тому
I didn't realize how much of these things I actually knew. On the other hand I learned a lot too!
@landanrainey7072
@landanrainey7072 3 роки тому
The longer videos are amazing! you’re such a good editor and great speaker
@kallehalldenassistant7578
@kallehalldenassistant7578 2 роки тому
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}........,,,,,,,....
@satoshinakamoto7253
@satoshinakamoto7253 2 роки тому
he forgot to mention the Tails OS and Prism laptops
@bringbackdislikes3195
@bringbackdislikes3195 2 роки тому
@@satoshinakamoto7253 Nobody asked
@JacobP81
@JacobP81 2 роки тому
8:39 If you don't trust a password manager you could just use a password protected encrypted folder. A lot easier then building your own password manager. Only problem is virtual memory could cache the data in plain text on the hard drive.
@antique9032
@antique9032 9 місяців тому
win10privacy has a option where it clears out the virtual memory sheet everytime it boots down
@blusun.
@blusun. 11 місяців тому
as a writer, i thank you for your work.
@benjaelee
@benjaelee Рік тому
Huh, the multiple email thing is actually pretty smart. i have my main email and a spam email, but I've never thought of making different branches of emails for different tasks.
@EMBEVIDEO
@EMBEVIDEO 2 роки тому
Anonymity is very hard to reach and you have to avoid most forms of technology. But there are things very powerful that help your real identity to be not that prominent:: Build up a fake identity and spread logical but not real information over the net. Try to make this identity transparent so that it seems to be real. And then use your real personal data only if really necessary. And avoid meta-data. I was working in big data projects and it is scary what you can do with information that seems to be "useless" to the public.
@azamean
@azamean Рік тому
I recommend changing your email occasionally too, it's very easy with outlook/Gmail to add an alias email, make it primary, and delete your old one. So if your email has appeared in any data breaches, it's gone. But you still have access to everything with very little effort
@danielo2541
@danielo2541 2 роки тому
I'm impressed that the US haven't tried to remove this video from UKposts
@anni-1921
@anni-1921 Рік тому
I have an alternative to the last step of complete invisibility, you can combine VPN service with Virtual Machine, on a VM you can set up everything which could be used to track you, so that way you become completely invisible
@ryanchowdhary965
@ryanchowdhary965 2 роки тому
The moment he said "how to become invisible if some government or an organization is tracking you." I said *"I don't know if this is true, but I am in."*
@swapnilgarg2829
@swapnilgarg2829 2 роки тому
Strong password is like sheldon creating long password for pennny. 😂
@Pianodaddyy
@Pianodaddyy Рік тому
Super excited to listen to this!
@maab4324
@maab4324 Рік тому
Good video. I've been doing something like your suggestions since 2007. But I've been doing it a hard way and need to use a spreadsheet to keep track of the passwords. I've been cutting down the number of passwords and will start using your suggestions.
@psychojan1715
@psychojan1715 3 роки тому
One day i will be an outstanding programmer and i love your videos. A big fan of your videos.😍
@Hallden_
@Hallden_ 3 роки тому
Thank you I really appreciate it! And you will for sure
@kallehalldenassistant7578
@kallehalldenassistant7578 2 роки тому
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,.....,,,,,
@boem231
@boem231 2 роки тому
You could also use a VM and reset it (to a certain state) every time you're done using it
@Sebasivx
@Sebasivx 2 роки тому
what is a vm?
@boem231
@boem231 2 роки тому
@@Sebasivx virtual machine
@ovallx13
@ovallx13 2 роки тому
or use a virtual machine and sock5 in addition
@TengwarTeacher
@TengwarTeacher 2 роки тому
A vm by itself is no different than using your own machine though. It’s pointless.
@boem231
@boem231 2 роки тому
@@TengwarTeacher it isn't. With a VM and you restore it to an earlier point, you ensure that no program stores anything on your machine
@LiborTinka
@LiborTinka 2 роки тому
I used KeePass for a long time, then Dashlane and then I finally migrated to Linux, made an RSA key pair and stored all passwords with GnuPG. There is a useful "pass" script working on top of GPG. The passwords are simple binary files (encrypted) and can be easily transfered between machines or synced with Git. Of course, it's better not to show your files - then a LUKS-encrypted file system on your OS drive and thumb drives comes in handy. There is also a great password generator utilities like "apg" and "xkcdpass" that can make rememberable passwords for you that are strong against dictionary attacks. If you are really paranoid, there are privacy-oriented distributions like Tails.
@HALEKSS686
@HALEKSS686 Рік тому
thanks for the tips man ! nice job
@niklasstefanseefeldt7777
@niklasstefanseefeldt7777 2 роки тому
Hi. I have a question when it comes to having multiple email addresses. Is it acceptable to have multiple aliases as email addresses? For example, Protonmail has this feature (in the paid version) where you can create multiple aliases which would act like having multiple email addresses. The question is, would it be a good idea? Thinking now, not directly, because those aliases are related to the main email address you have, so If someone would hack your email address he would get access to the aliases. So, in that case, would you recommend the use of aliases for having multiple email addresses? If not, for what would you use aliases?
@hamfahimkabir
@hamfahimkabir Рік тому
Becoming anonymous is really, really hard. All that things you said works only if you're trying to avoid corporate companies. YES corporate companies. They will have a hard time figuring who you are and making your profile stronger. But government and sometimes other companies will track you down anyways. It might be the way you type or other patterns you follow. And avoiding cameras are also very much impossible. Remember you walk in a certain way. You have favorite coffee or drinks. It's not hard to track you down.
@OneBiasedOpinion
@OneBiasedOpinion Рік тому
This was about digital invisibility. Not literal social invisibility. There’s a video on _that_ topic made by a former CIA agent and it showed just how much more difficult it is to absolutely vanish altogether. Most of it had to do with eschewing the digital environment completely, going cash-only, and mostly being a complete loner.
@fivr.
@fivr. Рік тому
nah just buy a whole outfit with cash through people you know, walk with rocks in your shoes into a starbucks with the anonymous clothes + mask and hide the raspberry pi, after that just stay on a VM or RDP with your proxy/vpn (preferrably mullvad vpn) when commiting crimes, and try to stay on TOR as much as possible. also change your cybercrime persona around every year or two and get completely new proxies. if you manage to do this without doing anything dumb like posting pictures anywhere you'd be very near impossible to track through governments. the only way to get you would be through opsec fails or through investigation of where your money comes from, but even if they raid you make sure to have your whole PC encrypted through veracrypt. remember all this is a bit overkill if you arent making over 1m/year or more through cybercrime, if your making less then that feds wont really care unless you really make a name for yourself in the time you spend building your personas or if you threaten national security. so nah tracking you down through the internet would be pretty hard for the government if you try hard enough
@Mr_Anubis
@Mr_Anubis 7 місяців тому
​@@OneBiasedOpinionsend link to me
@natek3954
@natek3954 2 роки тому
This is great! Thank you for sharing!
@AnonUntraced
@AnonUntraced Рік тому
Exactly what i needed
@FREAKERKNOWS
@FREAKERKNOWS 3 роки тому
looks like this will help me a lot! THANKS, Kalle!
@v9466
@v9466 2 роки тому
Your information will never be fully removed
@lanichilds2825
@lanichilds2825 7 місяців тому
Dang I actually really liked the intro lol Hope someone gets to sing vocals on it someday
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Переглядів 1,3 млн
6 Must-Have Security Gadgets That Fit in Your Pocket
9:03
All Things Secured
Переглядів 1,6 млн
Повістки у Києві: «Яке право вони мають забирати всіх мужиків?» #війна #мобілізація #військові
00:41
Слідство.Інфо | Розслідування, репортажі, викриття
Переглядів 1,1 млн
[실시간] 전철에서 찍힌 기생생물 감염 장면 | 기생수: 더 그레이
00:15
Netflix Korea 넷플릭스 코리아
Переглядів 38 млн
Мама и Чебурашка 🤪#shorts
00:33
INNA SERG
Переглядів 1,5 млн
How to Browse the Internet Anonymously
12:32
Linus Tech Tips
Переглядів 1,7 млн
How To Disappear Completely and Never Be Found
14:20
Sumsub
Переглядів 3,8 млн
How to Make Your Own VPN (And Why You Would Want to)
25:54
Wolfgang's Channel
Переглядів 2,2 млн
Edward Snowden: How Your Cell Phone Spies on You
24:16
JRE Clips
Переглядів 17 млн
Track Phone & Computers on The Internet 🌎
30:50
zSecurity
Переглядів 1,8 млн
How I Would Learn To Code (If I Could Start Over)
13:43
Namanh Kapur
Переглядів 6 млн
Why Some Designs Are Impossible to Improve: Quintessence
33:03
Design Theory
Переглядів 74 тис.
The Woman who Robbed $1 BILLION (and almost got away)
29:34
Johnny Harris
Переглядів 645 тис.
Getting Into Cyber Security: 5 Skills You NEED to Learn
8:12
Cyberspatial
Переглядів 2,6 млн
Повістки у Києві: «Яке право вони мають забирати всіх мужиків?» #війна #мобілізація #військові
00:41
Слідство.Інфо | Розслідування, репортажі, викриття
Переглядів 1,1 млн