Shared February 25, 2019
You can now support me on https://www.patreon.com/thehatedone and get access to more exclusive content.
To learn how to best protect your online privacy in 2019 means to learn privacy by compartmentalization. Isolating your different digital identities and activities from each other is the best approach to keep control of your data.
Techlore's Go Incognito tutorial series:
How to be anonymous on the web
Master uBlock Origin in advanced mode
Important sources and software
Good intro into security approaches and compartmentalization https://theinvisiblethings.blogspot.c...
Every piece of software recommended is listed here:
More direct links:
Intro to QubesOS https://www.youtube.com/watch?v=dD0_g...
Joanna Rutkowska on Qubes https://www.youtube.com/watch?v=S0TVw...
Tor Browser https://www.torproject.org/
Tor for iOS https://blog.torproject.org/tor-heart...
Orbot on Android https://guardianproject.info/apps/orbot/
uBlock Origin https://addons.mozilla.org/en-US/fire...
- read the docs https://github.com/gorhill/uBlock/wik...
Cookie Autodelete https://addons.mozilla.org/en-US/fire...
HTTPS Everywhere https://addons.mozilla.org/en-US/fire...
Firefox Klar https://f-droid.org/en/packages/org.m...
K-9 email client for android https://k9mail.github.io/
How to get a burner phone https://theintercept.com/2017/02/20/h...
Privacy by compartmentalization is very simple. You will create virtual compartments where you concentrate carefully separated pools of data. Each compartment will revolve around a different sphere of your identity.
The more security you want, the stronger walls between your compartments you’ll build.
The first compartment is for your professional identity to separate your business email and work related activity from the rest of your online presence.
The second compartment is for your social media so that you keep those advertising giants away from your digital life outside of their platforms.
The third compartment is for your private identity where most of your light browsing, news reading, watching YouTube and making online purchases happen.
When you become familiar with this practice, you can build more compartments.
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016
I used the reasonably-secure Qubes OS for 6 months and survived - Matty McFatty [@themattymcfatty]
How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux
other types of circulatory shock- distributive, cardiogenic, and obstructive shock.
Network Security 101: Full Workshop
How to protect your online privacy in 2020 | Tutorial
Linux Tutorial for Beginners: Introduction to Linux Operating System
Beginner's Guide to the Bash Terminal
How To DELETE Your Online Identity | Go Incognito 2.4
This is how Google is spying on everything you do
ONLINE PRIVACY: IT DOESN’T EXIST: Privacy and what we can do about it | Denelle Dixon | TEDxMarin
Ultimate smartphone security guide | How to secure your phone tutorial
These tools can protect your online privacy
Hack All The Things: 20 Devices in 45 Minutes
How to Make Your Own VPN (And Why You Would Want to)
How to protect privacy on your phone in 5 minutes | Tutorial for normies
How Do I Tails?: A Beginner's Guide to Anonymous Computing
Linux for Ethical Hackers (Kali Linux Tutorial)