How to be Invisible Online (and the hard truth about it)...

  Рет қаралды 1,761,541

David Bombal

David Bombal

Күн бұрын

Don't be fooled ... Occupy The Web (OTW) tells us the hard truth about being anonymous online. The brutal truth: Will using your neigbors wifi keep you anonymous? Can you hide from the NSA? Can you hide from Google and other companies? Will Tor help you? Will Proxy Chains help? Which phone do you need to use - Android or iPhone or something else? Which operating system - Windows, macOS or Linux? What is the truth? What do you need to use?
// Mr Robot Playlist //
• Mr Robot
// David's SOCIAL //
Discord: / discord
Twitter: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
KZbin: / davidbombal
// Occupy The Web social //
Twitter: / three_cube
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw
// Occupy The Web books //
Linux Basics for Hackers: amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh
Top Hacking Books you need to read: • Top Hacking Books for ...
// Other books //
The Linux Command Line: amzn.to/3ihGP3j
How Linux Works: amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming up
00:51 - Don't use the nighbour's wifi
03:02 - OccupyTheWeb books
03:44 - How to remain anonymous on the internet // The NSA is watching
09:56 - Be careful of your browser
13:35 - Turn off cookies
15:41 - ProxyChains and Tor demo
22:10 - The FBI story
25:30 - ProxyChains and Tor demo continued
28:36 - How to remain anonymous
33:05 - Using Starlink
36:18 - Recommended operating systems
38:34 - Untraceable phones (burner phones)
40:05 - VPN vs Tor // Don't trust free proxies
42:29 - Don't keep systems together
44:24 - Recommended e-mail service
46:53 - Bitcoin is traceable
47:58 - Anti-forensics // How to clean systems
50:41 - Recommended search engines
51:34 - Have different identities/systems
52:26 - Conclusion
tor
proxy chains
linux
android
iphone
ios
tails
tails linux
invisible online
hide identity
privacy
kali linux
online privacy
internet security
online privacy and security
online privacy tips
online privacy guide
internet security tutorial
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#wifi #iphone #android

Пікірлер: 2 700
@davidbombal
@davidbombal Жыл бұрын
Don't be fooled ... Occupy The Web (OTW) tells us the hard truth about being anonymous online. The brutal truth: Will using your neigbors wifi keep you anonymous? Can you hide from the NSA? Can you hide from Google and other companies? Will Tor help you? Will Proxy Chains help? Which phone do you need to use - Android or iPhone or something else? Which operating system - Windows, macOS or Linux? What is the truth? What do you need to use? // Mr Robot Playlist // kzbin.info/aero/PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: kzbin.info // Occupy The Web social // Twitter: twitter.com/three_cube // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw // Occupy The Web books // Linux Basics for Hackers: amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh Top Hacking Books you need to read: kzbin.info/www/bejne/qqOze5R5fKeVgbc // Other books // The Linux Command Line: amzn.to/3ihGP3j How Linux Works: amzn.to/3qeCHoY The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8 // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:51 - Don't use the nighbour's wifi 03:02 - OccupyTheWeb books 03:44 - How to remain anonymous on the internet // The NSA is watching 09:56 - Be careful of your browser 13:35 - Turn off cookies 15:41 - ProxyChains and Tor demo 22:10 - The FBI story 25:30 - ProxyChains and Tor demo continued 28:36 - How to remain anonymous 33:05 - Using Starlink 36:18 - Recommended operating systems 38:34 - Untraceable phones (burner phones) 40:05 - VPN vs Tor // Don't trust free proxies 42:29 - Don't keep systems together 44:24 - Recommended e-mail service 46:53 - Bitcoin is traceable 47:58 - Anti-forensics // How to clean systems 50:41 - Recommended search engines 51:34 - Have different identities/systems 52:26 - Conclusion
@Mr.Thinker-
@Mr.Thinker- Жыл бұрын
Pin your comment so it stays on top 👌🔝👀
@firosiam7786
@firosiam7786 Жыл бұрын
Could u do an av and other evasion techniques with occupy the web
@crypto8951
@crypto8951 Жыл бұрын
Best channel on youtube 💪💪💪💪
@MegaHax
@MegaHax Жыл бұрын
There is no secure browser or programs that can keep you anonymous if we continue to use the same communication protocols and ports 🥷
@keylanoslokj1806
@keylanoslokj1806 Жыл бұрын
@@MegaHax elaborate
@kittenisageek
@kittenisageek 10 ай бұрын
Over a decade ago I took a class in network security that was taught by a retired navy intelligence officer. One thing he taught us that has stuck was: "The only secure computer is one that is not connected and can not be physically accessed. Once a machine is accessible, it is no longer secure. The form of access doesn't matter -- physical access, network access, it all compromises the security of the machine. The line you will need to define in your future career is going to be the line between secure and accessible. A machine that can't be accessed can't be used, so while it is secure, it isn't useful. The more accessible a machine, the more usable it becomes -- and the less secure. The policies you write for your company are going to be a negotiation of that line between accessibility and security."
@DigitalNomadInvestor
@DigitalNomadInvestor 9 ай бұрын
"Air gapped"
@indiansmokar
@indiansmokar 8 ай бұрын
That’s a quite a bit of words you remember from a decade ago
@Bond2025
@Bond2025 8 ай бұрын
He wasn't aware of air-gap techniques used over 10yrs ago to communicate with any device via WiFi or Bluetooth. The device did not need to be connected to the Internet as whatever it was near could report the proximity. If you removed all RF devices and never plugged it in, you might find that people marked as targets would have to use something like USB storage to view files. Depending on the sites they were obtained from depends what was in them and what they did. Your off the shelf firewall will not help. The only decent firewall for stopping NSA and GCHQ was by Kaspersky, but they were also spying on you!
@linsqopiring6816
@linsqopiring6816 7 ай бұрын
@@Bond2025 Any sources or search terms for these air-gap techniques? Sounds fascinating.
@Soniic95
@Soniic95 7 ай бұрын
thats so true, just look how the sildroad dude got arrested, social engineering and boom, iirc he had a panic button on his laptop that would normaly brick it but he stand up and helped that woman ... crazy if you think abt it.
@seansingh4421
@seansingh4421 11 ай бұрын
What I hate about the NSA the most is that they’re letting too many abusive cybercriminals get away with stuff these days but common people still have suffer online privacy issues.
@jonbrand5068
@jonbrand5068 11 ай бұрын
They no longer have eyes on good cyber criminals. So they bother the rest of us,
@jameswatkinsiii7834
@jameswatkinsiii7834 11 ай бұрын
That is by design, the constitution is a Joke to those people, they use it like a boy scout metal as they commit crimes.
@trippmoore
@trippmoore 11 ай бұрын
And rich people can get away with not paying millions in taxes while you and me will get audited for not claiming $700 on our taxes. Best thing to do is accept it and adjust you actions accordingly. Unless you are born into that elite ultra-rich class of people you're screwed. Even if you cold earn or steal enough money to be considered one of the top tenth of a percent of the wealthy they would know you came from outside of their class and not going to be accepted into the club by your wealth alone. The one thing we have to get over the ultra-wealthy elites is something they are doing everything they can to disrupt is our numbers. If we could all just come together as one unified people against these elites then they could not stop us from taking them down. But that's not likely to happen is it? We are kept splintered into little antagonist factions at every level: Politics, race, gender, coke vs pepsi, you name it, the elites are behind all efforts to label us and wall us off from the one thing that is more important that those manufactured labels and unites us all into one massive collection is our status as human, non-elite. Or what I wold call human, if you allow me to consider the "elites" as non-human. They seem to lack humanity so I think it applies. Keep up the fight and don't let the bastards keep down my bother.
@ClassWarMatrix
@ClassWarMatrix 11 ай бұрын
Reminds me of some lyrics from dude named Daylyt "Who all up on the deep web? My P.O. , yeah we know" Yk the british empire and its network of financial monopolists were the ones who invented global narco and human traffick. They been laundering money from all that sht before it was even illegal . You best bet their successors the globalists are profiting from and enabling all the criminal sht that goes on on the dark web .
@CynHicks
@CynHicks 11 ай бұрын
😂 That's what they want
@SecurityPrivacyAnonymity6394
@SecurityPrivacyAnonymity6394 4 ай бұрын
My motivation to keep fighting for my privacy is that shit might not happen now, but in the future when my life is a lot more meaningful to me, they might also be a lot harder on how they control us. I hate being controlled, so I decide to learn and do now so I can be ghost later.
@LeeeerrrroooyJennnnnkins
@LeeeerrrroooyJennnnnkins 3 ай бұрын
1000%
@MatthewElvey
@MatthewElvey 2 ай бұрын
And this "guru" is not very smart. A lot of gaffes. @bulliontoy. Yup: Doesn't use filename completion. Doesn't know it's not necessarily a bug to not have a (public) IPv4 address when on TOR.
@fifski
@fifski 2 ай бұрын
And how exactly are 'they' controlling you? By forcing you to do mainstream things like going to shop, or doctor, or work? 🤣
@patrickp8822
@patrickp8822 2 ай бұрын
​@fifski exactly what a mind controlled person would say 😂
@Heavilous
@Heavilous 2 ай бұрын
@@LeeeerrrroooyJennnnnkins LEEEEEEEEROOOOOOOOOOYYYYYYYYYYYYY HHHHHHHHUUUHHJAYYYYYYYYYNKINS
@USMColdies
@USMColdies 6 ай бұрын
Absolutely love David's channel and wanted to add to the OPSEC recommendation of not carrying your personal phone with u to buy a burner- even more important than that caveat, one must NEVER carry around both your personal and burner phone with u at the same time. Any 3-letter or law enforcement agency can create a map of date & time where both your devices are pinging the same celltowers at the same time, thus tying u to the burner with circumstantial evidence. I like to think of the personal cell and burner as your wife and mistress, both should not know of each other much less be in the same place at the same time. And no, this wasn't a reference to infidelity...stay safe
@Si74l0rd
@Si74l0rd 6 ай бұрын
Yeah, and leave the burner on airplane mode unless you actively need to use it. IMSI catchers are deployed at most protests these days, if your phone isn't reaching out to cell towers it won't connect to a Stinger either.
@FunderDuck
@FunderDuck Жыл бұрын
“I don't know why people are so keen to put the details of their private life in public; they forget that invisibility is a superpower.” - Banksy
@APT4308
@APT4308 Жыл бұрын
Banger of an interview! We must have more OTW content David. Fulfill your destiny!
@davidbombal
@davidbombal Жыл бұрын
lol... glad you enjoyed the video! Definitely want to get him back much more often!
@APT4308
@APT4308 Жыл бұрын
@@davidbombal thanks for what you do. Simply the best. you guys with OTW owe us an interview with a Ukrainian hacktivist that are defending their homeland from russian cyber invasion on top of kinetic invasion. You had an interview with a russian young dev. And this is not fair. Give Ukrainians a chance to speak out.
@davidbombal
@davidbombal Жыл бұрын
OTW has spoken about Ukraine a lot in our interviews. Watch a few of the interviews with him like this one: kzbin.info/www/bejne/fabHimqOjtSoiM0
@APT4308
@APT4308 Жыл бұрын
@@davidbombaloh trust me©️ we watched ALL your videos! Thanks for what you do again. Just would like to head one of many Ukrainian infosec experts from the trenches of World Cyber War 1. I think it will be a hot content. Just pinch it to him he can get someone to agree for the interview.
@jeffreyryan7671
@jeffreyryan7671 8 ай бұрын
You know this guy is really a hacker, because he wears a hoodie. ALL hackers wear hoodies. X D
@Picsio64
@Picsio64 6 ай бұрын
I usually can't sit through long videos but I have to say, listening to OTW kept my attention to the very end. David, you did a great job in allowing him to share his straight forward and easy to follow info on keeping safe online. You asked the right questions and summarized in a succinct manner. Excellent!
@ronigbzjr
@ronigbzjr 10 ай бұрын
I used to work in intelligence over ten years ago, and everything he says checks out. These are all things that were taught to us. I remember reading the public case file that came out after the Silk Road bust and learning that DPR used the same cafe every day to do his browsing and I was like "uhhh, classic mistake..."
@cybersavage1337
@cybersavage1337 10 ай бұрын
This is a lie. Police in the US don't go around knocking on everyone's doors just because someone in the area hacked from a nearby IP. No judge would be able to approve such a warrant.
@VideoCesar07
@VideoCesar07 10 ай бұрын
Yep. Unfortunately, people are creatures of habit. Unless you are willing to go completely off grid in the middle of nowhere and forego nearly all electronics it is nearly impossible to not be traced somehow today. Even if you go off grid I am sure any of the major government intelligence and law enforcement agencies will find you if they want to. Facial recognition still has a ways to go, that we know of, but with cameras everywhere these days who is to say they would find you just because you unknowingly walked by a web cam or came up on a picture someone took where you just happened to be in the background somewhere.
@criSOME1
@criSOME1 10 ай бұрын
Maybe he stopped caring. There’s really nothing to hide from you megalomaniacs. It’s called freedom you fool
@Cubic_cat
@Cubic_cat 8 ай бұрын
I think doing this is possible, you just need NOT TO sit in the cafe, you can just live in the city with a high population, craft a wifi cannon, decorate it so it looks not like wifi cannon, and here you go!
@The_rabbit_hole
@The_rabbit_hole 8 ай бұрын
Yeah I couldn't work out how he thought that was a good idea, especially when he went to extraordinary lengths to keep everything else hidden
@JJ-sw8rm
@JJ-sw8rm Жыл бұрын
Much, MUCH appriciation to the both of you David. As a aspiring Cyber Engineer, it's like you guys answer all the little and big questions I think lol Thank you!
@KG-wd1uu
@KG-wd1uu Жыл бұрын
I know who the 'faceless ' man is - he is my neighbor 😭😭😭
@songbwae9521
@songbwae9521 11 ай бұрын
Dunno wtf a cyber engineer is supposed to be but heads up OTW is a clown
@puppergump4117
@puppergump4117 11 ай бұрын
@@KG-wd1uu He must look dorky to you lol
@enriquehidalgo1540
@enriquehidalgo1540 11 ай бұрын
16:41 16:44 16:45 16:45
@zephyrr108
@zephyrr108 6 ай бұрын
what the heck is a cyber engineer
@tjmarx
@tjmarx 5 ай бұрын
This was stuff being talked about 3* decades ago in the early 90s. What is being described as anonymity here, is really pseudoanonymity. There is no such thing as actual anonymity online. I like to think of the internet as standing in a conceptual digital square wearing a name tag. You can put a disguise on and cover your name tag, but if someone really wants to know who you are, or someone who already knows you and is paying attention comes along your efforts are for nothing. You are more anonymous in real life than you are online. So if you're looking for privacy, the ultimate hack is to take offline and into the real world everything you can.
@askfaisalmuslim
@askfaisalmuslim 5 ай бұрын
30 decades ago, that is 300 years ago 😋
@zsmith4853
@zsmith4853 2 ай бұрын
​@@askfaisalmuslim Nope.
@ryanqvincent144
@ryanqvincent144 7 ай бұрын
What I like about this episode, apart from all the very useful suggestions, is the constant warnings about how how difficult it is to be 'hidden' online! This is so very true. The mention of of having multiple identities and completely different behaviors in the different identities is very important. Note: Having different identities for social media and emails is useful anyway to help protect you from 'trolls' and people who like to 'bully' you online. Thanks for sharing this it really is very useful information indeed. :)
@Neighborhoodcarpetcleaners
@Neighborhoodcarpetcleaners 5 ай бұрын
Now you abuse. Harassment on multiple identity
@ryanqvincent144
@ryanqvincent144 5 ай бұрын
@@Neighborhoodcarpetcleaners You are confusing me with someone else. I only use this userid on YT and similar services. I only reply to people in comments. I don't like harassment or bullying done to me. I don't do it to others. Beware of the 'troll's. They user similar usernames to confuse real people. It is what they do.
@moshedayan9253
@moshedayan9253 5 ай бұрын
If you want ultimate PERSEC where you'll never be caught, then you start here: buy a laptop with a gift card or cash. Giftcard should only be bought with cash and a mask on. Also make sure you made it to the store untraced by any public recording cameras where it wouldn't see your face or a license plate perhaps. The laptop should be used with layers of encryption/VPN, and in a location far from your house. Once you have what you need, your files should be placed in an external harddrive outside the laptop. The laptop should be placed inside a faraday case and hidden away. The location you're at should also be untraced by any public cameras that could see your vehicle or face. But with the layers of encryption, it would take government hackers too long to trace the location. And by the time they do, you will have been gone for days.
@freedomisfromtruth
@freedomisfromtruth 4 ай бұрын
@@moshedayan9253 Just buy your hardware used, why go through all that crap with gift cards
@quadzilla3359
@quadzilla3359 11 ай бұрын
It's funny, how I tried watching Mr. Robot around the time I started my cybersecurity journey and I thought it was a good show but started losing interest during season 2. Fast forward a couple years later and countless hours of studying pentesting, I decided to restart the series a few days ago and its way better than I remember and so many of the small references make sense now lol. Including the exit node scene from episode 1.
@prolificseeker4778
@prolificseeker4778 11 ай бұрын
Right on man, you watched it on Netflix??
@SkeltherBot
@SkeltherBot 9 ай бұрын
Yea, its funny. Seems like me, 5 years ago first time i watched it. This series is muuuch better if you know what's happen on the screen.
@chrisdawson1776
@chrisdawson1776 5 ай бұрын
@@prolificseeker4778>Series about hacking and technology >Did you watch it on Netflix? Lol
@freedomisfromtruth
@freedomisfromtruth 4 ай бұрын
I tried to watch it since it was techy but it was boring at the time. I'll wait when its on free streaming
@V___156
@V___156 2 ай бұрын
Seriously. For me, I'm watching it right now, and the references for Linux, Tor, Phishing, etc, make a lot of sense after 6 + months of training.
@TheOriginalJohnDoe
@TheOriginalJohnDoe Жыл бұрын
Besides quality content, this really feels like a thriller podcast I'm watching. I absolutely love it.
@steveraby6023
@steveraby6023 7 ай бұрын
This episode has confirmed many of my suspicions and opened my eyes to a few more. Thank you for sharing some really good information. Great video from an awesome channel 👏
@brettjamesy
@brettjamesy 7 ай бұрын
Another great video... The limitation of this technique, is not being able to use burpsuite for MITM and proxychains... However, adding a SOCKS TOR proxy to burpsuite, diverts outbound traffic through the TOR network... without proxychains
@marinob7433
@marinob7433 Жыл бұрын
great interview. as OCTW said...even he...is not anonymous to some people that have resources,time and skills. great interview Dave. Great presentation. i believe you must create a course for footprinting etc. or even as an end user..if someone attacks you , some basic forensics and if you have a chance to find by yourself this neighbour ...it will be valuable.
@bjamiork
@bjamiork Жыл бұрын
Wild, I was JUST pondering this very question two nights ago. I've used Tor on and off since maybe around 2007 and since then, I've become a sysadmin. I'm always thinking about cyber security and how I can improve it. I figured the NSA pretty much had a handle on Tor. Good info in this vid, thanks!
@ralphm6901
@ralphm6901 11 ай бұрын
I would not be surprised if NSA and every other national spy agency has at least one TOR node.
@HelovesU-we4qh
@HelovesU-we4qh 2 ай бұрын
This guy must work for the government, he's not really giving you anything that makes you truly anonymous!
@davideusebio1854
@davideusebio1854 Ай бұрын
Say your suggestion
@Lars_Paulsen
@Lars_Paulsen 8 ай бұрын
Another thing that's important is to never mix your hacker life with your public life. That means as an example; If your turner phone is located where your private phone usually is located, that would be a no no, even if your private phone isn't there or off at the time. Treat all of the things you use that can connect to the web or to a phone company as a node and make sure that hacker nodes have never been online in, around, on the way to or together with any of your private nodes. If they have, you can get rid of them at once. This is one of the reasons why there are schools for these kind of government operators. It's also the reason why people who are working under these kind of rules don't do much else than this work. It takes up a lot of the time each day, just to do the smallest thing.
@franciscozubillaga3241
@franciscozubillaga3241 4 ай бұрын
Yes, I'm a little techtarded myself but was always concerned with the blue tooth connecting to local devices possibly showing location.
@lilchoppa7833
@lilchoppa7833 2 ай бұрын
​@@franciscozubillaga3241Same
@renn3014
@renn3014 Жыл бұрын
This is so interesting and informative! I’d love to hear more about using Linux as I’m a newbie :D this was so interesting and remaining anonymous is definitely not something you can do by purely using a vpn and I’m so glad you touched on that ! 🙌 great video
@scorch4299
@scorch4299 11 ай бұрын
any vpn you buy is attached to your credit card :P meaning law enforcement can supeanoa it
@luwfu7467
@luwfu7467 8 ай бұрын
when bad people exposing themselves out in the open in broad daylight proudly doing bad while people against them has to be shady, creeping, tip toeing in the dark like thieves. upside down world and you comply
@isloth75
@isloth75 4 ай бұрын
Glad someone spoke clearly about the use of AI in assessing & using our data. It does seem like AI tries to think ahead for us. It does seem intrusive. Just because I'm thinking about holiday cookies, doesn't mean I want them to pop up in adds everywhere. At first it made me scared that some mind-reader or psychic was harassing or targeting me via my phone. That's just how it can really feel. Especially if "push alerts" are not controlled.
@nsrstevenson
@nsrstevenson 8 ай бұрын
David, I am watching both of you with much anticipation and realizing how fast the world is moving away from my limited understanding of the basics of computer science. what brought me here is the frustration state I am in for the past two weeks. I recently discovered that all my social media accounts have been hacked. My inbox is full of warning and threatening emails.!! I need your help if you can please. Looking forward to hearing from you. Nicholas
@hopesy12u4
@hopesy12u4 2 күн бұрын
Dude no, call your police station, they should have a cybercrime unit. Also, call a lawyer, see what he says just in case.
@jamesmckee9017
@jamesmckee9017 Жыл бұрын
Occupy The Web is a guy I could see myself having a beer with.
@davidbombal
@davidbombal Жыл бұрын
But neither of us ever will unfortunately as he is totally anonymous...
@thedapperturkey
@thedapperturkey Жыл бұрын
If you could find him lol
@jamesmckee9017
@jamesmckee9017 Жыл бұрын
​@@davidbombal Hmmm, well if I were to ever be blessed with a job offer from the NSA... It would be good incentive to accept, if for no other reason than to grab a beer with OTW 😊
@jamesmckee9017
@jamesmckee9017 Жыл бұрын
@@thedapperturkey I'm nowhere near that good...lol
@davidbombal
@davidbombal Жыл бұрын
lol... that's a great comment James!
@dennismatsson9995
@dennismatsson9995 8 ай бұрын
I would LOVE for this to be a podcast
@JeremyMcMillan
@JeremyMcMillan 5 ай бұрын
I think we need to shift the conversation from the ideal of anonymity to the practical compromise of pseudonymity, and just use anonymity as a benchmark for evaluating different identity defense systems. Only the designers need to dither about the Philosophy and formal logic. Everyone needs an optimally engineered solution.
@GhettoLenin
@GhettoLenin Жыл бұрын
This is my favorite KZbin channel. Most informative and thought provoking hands down.
@DaWhiteTyger
@DaWhiteTyger 8 ай бұрын
Man thank you for this interview! Alongside the instructions, I was able to find a far easier way to setup configure and launch firefox and the TOR browser onto a daisy-chain of proxies! One step closer, MY MAN! Liked and subbed, usually don't sub to big channels but you are another Louis Rossmann, big enough but good enough messages to not pay attention to. (R2R 4 Eva!)
@binford5000
@binford5000 21 сағат бұрын
Ü😅
@stephenfwadsworth9565
@stephenfwadsworth9565 7 ай бұрын
Spent my young years finding people, before internet. So Groan.
@rami.0092
@rami.0092 Жыл бұрын
I like the way that you gather things for good purposes and you do. It encourages me to see any video you create, Sir. I highly appreciate your work. Keep going on.😊👍
@Goodwin454
@Goodwin454 Жыл бұрын
I love what you do boss , always I have to come to your channel at least once a day , one of the people that making change for the good in this world . I really have an immense respect to you Sir .
@TheElectronicDilettante
@TheElectronicDilettante 7 ай бұрын
Thanks for all the great videos. Excellent content and guests, you know who, for example. I’m almost 50 and I regret, every time I log on the a piece of tech, that I didn’t try to learn Linux when it first hit the scene. My concern now, has to do with Microsoft , adding the WSL functionality to the stock options of Windows. When you read the user agreements that are buried along side and pertaining toWSL, it seems that it was not a benevolent decision to allow Windows users to access Linux. I hope someone looks into this because Microsoft doesn’t do anything for free. And the way the new user agreements ( that no one reads and blindly agree to) seem like the position Microsoft to take ownership of anything the may be created under WSL. I hope I’m wrong. If not, I hope someone brings it to light. Thanks again!!
@mabrouk642
@mabrouk642 7 ай бұрын
Quality content as usual, Thank you David!
@todorivanov317
@todorivanov317 Жыл бұрын
I really enjoy these podcasts, when i have long drives i always put yours on. Thank you for doing what your doing David. Im really excited about the Pegasus video. All the best!
@TehPixel8dNinja
@TehPixel8dNinja Жыл бұрын
Love seeing OTW on the channel! Great interview and information, thanks so much David!
@ed1g1tal
@ed1g1tal 8 ай бұрын
Great info. One counter argument - An anon VM is way easier to quickly/cleanly nuke and dispose of than a separate HW rig is.
@martinberan2136
@martinberan2136 2 ай бұрын
But your VM still carry your own MAC addr. Therefore your computer.easy to compare. Unless you will flash the network adapter (not all can be changed)
@H2R5GSXR
@H2R5GSXR 2 ай бұрын
Great upload. I was USAF working for NAVY in a Unit voted Best unit in NSA for the year.
@MaxWinner
@MaxWinner 11 ай бұрын
In the uk, a guy gets stung for trying to meet children online, all while another police department are watching and gathering evidence on his neighbour who has stolen his identity, and is posing as him to meet children online - they let the innocent guy's life get demolished because they didnt want to blow their case, he lost everything - so yeah, they know if you use the neighbours wifi
@ralphm6901
@ralphm6901 11 ай бұрын
I wonder if they'd know if you use some random other person's wifi some distance away, by using wireless-to-wifi relay. Imagine a battery-powered device with something like a RaspberryPi, the wifi connects to someone's wifi, and a wireless adaptor with a sim card to get on the phone network. Dial that phone number and you're using that other person's wifi from miles away.
@ankush5814
@ankush5814 Жыл бұрын
Needed all the content that he tells in this video to learn for free. And thanks for uploading the important information for learning. ❤
@jhoneyb
@jhoneyb 8 ай бұрын
Thank you OTW. Fascinating stuff, and very grateful to you.
@SindhuSaraswati
@SindhuSaraswati 8 ай бұрын
Informative! Thanks David and the anonymous guest.
@abdirahmanmohamedsaid6201
@abdirahmanmohamedsaid6201 Жыл бұрын
Thank you David and OTW . I have already received the the books you mentioned. Best teacher and best IT youtuber. Waiting for more episodes like Pegasus. Thanks for your information and knowledge.
@electric_cafe
@electric_cafe 10 ай бұрын
Mr. David I absolutely love your shows and try to do my best in viewing them all. I'm kinda new to this field but have found it to be what you could call an obsession/passion in everything to do with hacking. I've never heard of OTW and find him truly fascinating and informative. I appreciate all your efforts and the things you share with us all. Maybe you could have him or even yourself doing a show on AndroRAT, Android-RAT Hawkshaw, Dendroid, HaxRat, LaRat, Mass-Rat, Teardroid-phprat and WH-RAT. Maybe all the RAT's? I apologize if you've covered these already. As I said, I'm new in this field and to your channel as well. But thank you none the less for all that you do. It's greatly appreciated.
@dominichowell961
@dominichowell961 7 ай бұрын
Don't play with RATs if you're new to hacking
@parryoyakhire6568
@parryoyakhire6568 9 ай бұрын
Whoever controls the final notes controls the traffic. That's my Golden Nugget
@williamedwards6519
@williamedwards6519 6 ай бұрын
On a dedicated flash drive, run a trimmed OS, custom configured for only the interface you plan to use. Complete with only the drivers for the exact devices installed, and any additional drivers for hardware you might use. Cut the OS to the BONE. Pre config to he is your swap file, set to a second flash drive, yes, a separate drive, not a separate drive volume on the same physical drive. Use Tor or another alternate connection method,, ( if using the neighbor's wifi, use at least 3, hopping thru three different homes, ideally choosing neighbors w/ 3 different ISPs ,)then running the chain link, then, share your connection to a secondary device, connect to the Internet thru the provided link, then , run tor, run chain link...profiles are the key. Create profiles of people who naturally would be searching for what you'll search for. Health- a mother, "how to.." a tinkerer, a 'maker", a jr reporter. Don't forget to make a few with your same name, and build them up on social media. Because they know you exist. You HAVE to be on the internet SOMEWHERE, right? Or dead....
@ambrosebeavers
@ambrosebeavers 5 ай бұрын
Hey David, thank you. This is good stuff. What is your recomended start point to be an ethical hacker please?
@owenk8203
@owenk8203 Жыл бұрын
2 million soon! Can't wait to see what you have planned! Congrats David. You're awesome.
@davidbombal
@davidbombal Жыл бұрын
Thank you very much Owen! Hopefully be soon :)
@nieczerwony
@nieczerwony 11 ай бұрын
How David still doesn't have 10M subs is beyond me. I subbed when there was like 500k, and I am very happy to see him having nearly 2M, and proud to be part of this community of secure conscious folks. You don't have to be networking engineer or even IT. Just realize that big part of everyone's life today is in the internet and you should be interested in this topic.
@davidbombal
@davidbombal 11 ай бұрын
Thank you!
@rxtechandtrading
@rxtechandtrading 11 ай бұрын
​@@nieczerwonyhis Udemy courses are actually really good to
@alexsledge
@alexsledge 11 ай бұрын
I don't try and be invisible, but I do poison my data with many un-me activities anytime monitoring is possible. Exactly the same method for dealing with AI. They use your interactions to further train their models, so take action to break them with inappropriate feedback to the "AI".
@ralphm6901
@ralphm6901 11 ай бұрын
Back in the day when email was first practical, people were concerned about NSA, FBI, etc reading their emails, so some percentage of users changed their signatures to include words like bomb, gun, and explosives in order to poison the well and make the scanning machines scan and store worthless emails as well as any that might be interesting.
@alexsledge
@alexsledge 11 ай бұрын
@@ralphm6901 Yeah, I did that. Lots of fun to be had on mainframes back then.
@Rome.
@Rome. 8 ай бұрын
Brilliant upload David & OTW. Can people also be traced via their device MAC address ?
@Otero_2
@Otero_2 7 ай бұрын
I'm watching you off video, and i'm thinking i've never joins anyone or paid anyone to hear a see, they're material, but You caught my attention and I so need some wisdom pertaining to security on the net and More. I Have Some Questions And Was Wondering If There's A Way To Communicate Privately? THANKS, I'll Await A Response.
@Working800
@Working800 Жыл бұрын
As always good content, I'm impressed with you I really like your videos usually with videos longer than 10 minutes I watch them between days but yours almost always keep me engaged.
@anapaulac.diasvaz1132
@anapaulac.diasvaz1132 11 ай бұрын
I just want to tell you OTW, that you are a great source of information and knowledge. I now understand how dangerous is the web. Please keep giving us more feedback on forensics/wifi hacking/ tracing bitcoins and tracing scammers!!!
@Tyler-hh8jx
@Tyler-hh8jx 8 ай бұрын
thank you OTW you're awesome, good stuff on here really appreciate it! I'd love to see you on here discussing some wifi hacking info
@xscitobor1233
@xscitobor1233 7 ай бұрын
When ever Tor and layers come up I always think about shrek and i was no dissapointed today
@dwolf0012
@dwolf0012 11 ай бұрын
David Never fails to deliver Great Cybersecurity Knowledge! Thanks
@jameswatkinsiii7834
@jameswatkinsiii7834 11 ай бұрын
I think that it might be impossible to be anonymous, because at the Hacker conference we talked about a lot of other things, VM's,Screen Size, hardware heuristics, browsers. And the US three letter folks can crack all of these. The speaker was hiding from Russia and other cartels that his jobs was to attribute crimes to. He said he could not defeat the US cyber hounds. Even if you beat them, your traffic is the only one that is Anonymous. You then stick out and they can watch for that traffic. Hiding in plain site is the concept that would be the best chance of obfuscation. And staying on the move. And like the guest mentioned using starlink. And please don't do bad things in cyber space. Thanks for the great content.
@Sumbdy_u_know1999
@Sumbdy_u_know1999 8 ай бұрын
Great interview! Guys the real deal, If you're into hacking, windows should not be your OS of choice
@frugalwilliemae
@frugalwilliemae 5 ай бұрын
New subscriber! Thank you for this video!!
@kandym3478
@kandym3478 Жыл бұрын
Can you guys make a video on people search and how to OSINT other people, including yourself? Not like hide from the FBI privacy, but to show the kinds of tools and techniques someone doing the investigation would use. I think it would fill in some gaps.
@shade115
@shade115 Жыл бұрын
The problem with disabling cookies is some websites will actually limit functionality or even make it impossible to navigate unless you turn on and accept cookies. How do you overcome that?
@QuintinMassey
@QuintinMassey 3 ай бұрын
I’m super critical when it comes to seeing how someone “moves” around the file system using the terminal. I hope he was being deliberate about everything just for the sake of being clear to people watching because it was telling if not haha
@pimpampet7053
@pimpampet7053 Ай бұрын
Nice video Dave. But strange you're not discussing Tails OS. Get a cheap or second hand laptop with 8Gb RAM (the more the better), a bootable USB3 port (almost al laptops from five years or younger have that) and a USB3 thumb-drive and you have a quite quick anonymous machine....
@sasookay514
@sasookay514 11 ай бұрын
A lot of this stuff is very logical if you know a little bit of how the basics of the internet work (ie. DNS, IPv4, ISPs, etc). I'm just a normal IT guy thinking of getting into Cybersecurity and I spent a lot of time thinking of how to stay anonymous and I kept coming up with "nope can't trust that, or that, someone else owns it, so they can probably see it". This video really validated a lot of what I was thinking which is what I kind of needed to hear. Thank you to David and OTW for confirming that becoming anonymous while invaluable is incredibly difficult and is really all about what's it's ultimately worth and to who it's worth considering all the breadcrumbs that become so easy to leave behind. It really takes a lot of effort, intelligence and constant awareness to stay anonymous.
@anandparan3011
@anandparan3011 Жыл бұрын
Arguably the best technology and security KZbin channel. You cannot find this much quality content,even if you are ready to pay for some dollars.
@rxtechandtrading
@rxtechandtrading 11 ай бұрын
hes beter than most of the jerkoffs on youtube dats for sure!!!!
@not12listen
@not12listen 8 ай бұрын
It was detailed that the GUID of a user account is embedded into Office files. Does the same thing occur on LibreOffice files?
@user-rs1lt2vt4g
@user-rs1lt2vt4g 4 ай бұрын
Thank you so much David 🙏 and the Gentleman 🤠
@tao3964
@tao3964 Жыл бұрын
David's content should be getting at least 10k likes. He is literally giving out paid information for free.
@carstenjensen3123
@carstenjensen3123 Жыл бұрын
He is actually not giving away much information. He just goes on and on about how "they have other sources than the IP-address and so on". He doesn't get into what other sources - only that you have too understand them. This seems to be more of an hour long ad for his books and him.
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
@@carstenjensen3123 he's pushing protonmail, that's enough for me to switch off
@atorik1076
@atorik1076 Жыл бұрын
Nah, this informations arent really that special.
@camelotenglishtuition6394
@camelotenglishtuition6394 Жыл бұрын
@@atorik1076 *information
@techslugz
@techslugz Жыл бұрын
I agree with you bro he should have 10k+ views always as his content is amazing! But I gotta ask what is paid information? If you mean that others have taken the information and packaged it into a course to sell. Then he doesn't sell courses it's more like a show. Also, all of the information is available for free, and has been for decades, online. Actually, if you want to learn more in depth dude, continue watching David because he is great! Lol but also, follow some documentation that you have to read and do actions. Make a target and figure out how you can achieve 🙃
@sonofbadbill9501
@sonofbadbill9501 11 ай бұрын
I had wondered about something based on the burner phone. A wifi style device that can be located far enough from your physical location to confuse your location, buried or sited somewhere remote(on a roof?). You would wifi to the device using the biggest security key possible. I'd say that if you were geo-static then if someone wanted to badly enough, then they could still get you by electo-magnetic techniques, so you'd want to keep moving. A lot of trouble for the average person whose not in fear or up to no good. But the concept of presenting a moving target has got to be the best solution. I also wondered if it would be possible to just tag random cars with a network of wifi-style devices. Of course then there is the issue of the car(s) driving out of range. Moving target and no financial traceability to me are the concepts to develop on. Interesting topic just from a technical puzzle perspective.
@davemccombs
@davemccombs 9 ай бұрын
"Electro magnetic techniques?" lol
@fredod5271
@fredod5271 3 ай бұрын
Great show... More Mr. Robot and wifi info would be helpful.
@timandersson9562
@timandersson9562 7 ай бұрын
Recommend any add-ons for brave browser? Does they make u less secure? Great video
@kristeinsalmath1959
@kristeinsalmath1959 Жыл бұрын
Thank you two for this interview and the hard "pills". Also, I still stick with FF. Not only for "privacy", to avoid monopoly of "chromium" as well. Use Brave is keep the monopoly of Chromium.
@zvxcvxcz
@zvxcvxcz 11 ай бұрын
Same, and with some tweaks Firefox is just as anonymous as Brave, but Brave hasn't been around long enough to build up trust with me either.
@luphoria
@luphoria 10 ай бұрын
The mention of Brave feels like an ad lol. Brave has analytics (worse than Firefox). This guy seems to have pretty juvenile understanding of opsec, but a juvenile understanding is plenty enough if all you're doing is talk shows and hiding your commercial identity
@kristeinsalmath1959
@kristeinsalmath1959 10 ай бұрын
@@luphoria It's good say "I use Brave" but actually I use a Chromium self-compiled by me"
@mwright80
@mwright80 10 ай бұрын
​@@luphoriaok.... so direct to something better.
@etuc123
@etuc123 9 ай бұрын
Librewolf is the Brave of FF
@nieczerwony
@nieczerwony 11 ай бұрын
I think it would be a good idea ro invite some of these scammer hunters, and ask them few question on how you can really try to track them. These guys are really like the cancer of the internet, and unfortunately most often are placed in countries with corrupter gov and police. I think if more people would know some basic tools and techniques to make their life litrlebit harder, it would benefit everyone.
@intermed-ia9084
@intermed-ia9084 8 ай бұрын
Hi David, First of all, many thanks for this interview. I would have been interested about stay anonymous while webhosting a web platform. Does a webhosting service exist allowing anonimity of the owner of a website ?
@Tech-geeky
@Tech-geeky 7 ай бұрын
an IP address has to be known... That is the way it works.. It would be like trying to find someone's house but not knowing their address. That by itself, may not mean much, but the rest is up to you... how much info is givin' up by the user resolves to "now we have something we can piece together" The more info givin up, the more can be linked to the IP address. Get the picture ?? All of a sudden, you get to a point, where so much more info is online about an individual, you don't need to go at the user anymore. Its more convenient, and direct, but you don't have to. As now there is a better alternative to do it, (without your knowledge). Which is even more of a scare afterthought...
@leonardoduso4121
@leonardoduso4121 Ай бұрын
Dude, the second a book like that is on the market, the vulnerabilities get fixed
@TheJensss
@TheJensss 11 ай бұрын
Not a topic that is talked a lot about, but what about researching the possibility to tap data from PtP radio links? In many cases I would guess this would be similar to WiFi hacking, since the same encryption techniques is often used. Tapping data from cell towers could also be a interesting topic (if it is possible).
@thewhitefalcon8539
@thewhitefalcon8539 7 ай бұрын
Point to point? Like wireless backhaul?
@TheJensss
@TheJensss 7 ай бұрын
@@thewhitefalcon8539 Yes, or point to multipoint systems that are used by many wisps
@MrSuperG
@MrSuperG 7 ай бұрын
Yeah
@MotivadorProfissional
@MotivadorProfissional 9 ай бұрын
All the REAL hackers would be laughing right now if they watched this old man pretending to be one of them.
@davemccombs
@davemccombs 9 ай бұрын
No True Scotsman fallacy
@mariobewater3500
@mariobewater3500 8 ай бұрын
I love your programm David. Thank You so much😊😊
@imamulhuda6202
@imamulhuda6202 8 ай бұрын
Very informational as always 💖
@gelkdaddy768
@gelkdaddy768 11 ай бұрын
Occupy the web is amazing. Listening to the two of you on the stream has been one of the best streams I’ve ever listened to. Great content David.
@Bond2025
@Bond2025 8 ай бұрын
Ryan doesn't know that there is no agreed standard for encrypting mail sent between ISPs so it all goes as plain text. Protonmail can see everything without the need to decrypt anything after they encrypt it for users. Law Enforcement love it. He confused End2End with Encryption2Server. This is a common mistake.
@ebokanebo6386
@ebokanebo6386 7 ай бұрын
@Israelisnotourfriend actually, if you missed it or you had already stopped watching, at 50m 50secs on the video timeline you will find them telling what OTW would suggest using as an alternative browser solution@@Israelisnotourfriend
@JestXDX
@JestXDX 6 ай бұрын
@@Israelisnotourfriend They said the alternatives, you just didnt listen. And its not about "dont use them" Its about "dont use them if you want to remain anonymous" Most people dont care about their anonimity, which is fine.
@Neighborhoodcarpetcleaners
@Neighborhoodcarpetcleaners 5 ай бұрын
​@Israelisnotourfriend so it really does not matter, when it comes to your privacy. They did say don't use Chrome. As an alternative
@JB-dz7sb
@JB-dz7sb Жыл бұрын
Yes, really appreciate your work guys. Please bring all those topics starting with Bitcoin tracing/anonymity.
@TheBlackmanIsGod
@TheBlackmanIsGod 8 ай бұрын
Since you can run Linux through Ish Shell on your iPhone, can you then also setup proxychains on your iPhone?
@Tech-geeky
@Tech-geeky 8 ай бұрын
You know the same info that is designed to help educate your own network, can also be used to educate bad people as well , so in fact, your not not helping the good guys, your just fueling the bad guys.. by much more. That's some figures to put on right there. "Really hard to stay anonymous" THANK YOU.. this person. tells the truth..
@rawgage9159
@rawgage9159 11 ай бұрын
I'd love to hear his thoughts on the additional security of using a Virtual Browser for secure surfing (Network Chuck created the concept and made a video on it).
@bradley1995
@bradley1995 8 ай бұрын
It still has to traffic the data such like a proxy.
@LiEnby
@LiEnby 8 ай бұрын
​​@@bradley1995 no its worse- It's streaming the entire chrome or firefox browser to you, they can like actually record your screen and keypresses even if they wanted.
@timopint1125
@timopint1125 5 ай бұрын
just ask him yourself. order and cancle a book of him you will get some information from his bank and business
@russellstall169
@russellstall169 5 ай бұрын
He did not create the concept lol
@LiEnby
@LiEnby 5 ай бұрын
@@russellstall169 pretty sure i saw some failed startup try to stream chrome into chrome before, and before that even there was the puffin browser that would stream chrome in order to allow flash to work on mobile.
@MsHojat
@MsHojat 11 ай бұрын
One thing I've kind of been concerned about (although I personally don't have anything to hide, but stay anonymous anyway) is communication analysis. Especially with how much more more work on AI is occurring recently (but even really before that), it seems quite easy to have a bot go through vast amounts of scraped data (be that on a relatively private chatroom, or public website) and analyze their writing style (or voice when applicable) and tie it to other accounts which would otherwise be impossible to tie together (due to taking extreme privacy measures). I would expect that government orgs would have this tech, but I'm surprised that I've never heard about it, because we've had this capability for well over a decade, easily. I'm wondering when it might become more common and/or when privacy-minded or paranoid people start using AI scramblers to re-word every single thing they say.
@DxBlack
@DxBlack 11 ай бұрын
All the same: you can train AI to re-write your text as if someone else (say, a celebrity) wrote it. Needless to say they won't be able to reverse what you wrote at that point, nor would they assume the celeb you trained on wrote it. 😗
@HighestRank
@HighestRank 11 ай бұрын
Tell me that you use an ad blocker, without telling me that you use an ad blocker. Hello, never heard of Grammarly? It's pointless for you to do all this 'hidden but not hiding' schtick if it's gonna make you draw the whole 'ACKSTUALLY...' crowd right to your door stoop.
@linsqopiring6816
@linsqopiring6816 7 ай бұрын
@@DxBlack Until the time they write AI to filter out the influence of AI rewriting.
@Tech-geeky
@Tech-geeky 7 ай бұрын
@@HighestRank well, all i'm picturing now is Americans in the 1938 running of "War of the worlds", scared of Alien invasion, only to turn out, it was a "British radio broadcast" 😆 The similarities with that ,and privacy is uncanny.
@JamesMisener-fc8md
@JamesMisener-fc8md 7 ай бұрын
every American should hide every single byte of info from those demons at Google & the nsa!
@InnovationScience24
@InnovationScience24 6 ай бұрын
Thanks for those amazing infor, David my regards to occupy the web am sure I will be able to build back my workstation and how about when I got a question to ask.
@Opotomuss
@Opotomuss 8 ай бұрын
So I found that the best way to remain anonymous from the law online is to not do illegal things online or talk about illegal things online. I don’t see the average person doing all this because they think some one is gonna steal there info while buying something on Amazon. But hey some ppl might my neighbor who just moved from Sinaloa he does stuff like this even for simple stuff … he I think just likes safety cuz I helped him install some really cool cctv cameras last week and he got really excited about the motion detectors ..he’s super nice too with some crazy tats .
@charginginprogresss
@charginginprogresss 11 ай бұрын
Seemed like a serious anonymous dude, then he adviced crapmium browser brave lmao
@Slackware1995
@Slackware1995 11 ай бұрын
First rule, always use a private DNS under your own control. What isn't talked about is how quickly you are identified by your meta-data. Lets say you go to a public terminal leaving all electronic devices at home. You will quickly be identified based on how you type and what sites you go to. How fast you type, how you spell, your grammer and more are all part of "how you type". This meta-data is so unique as to be close to a fingerprint. Combine that with which websites you visit in what order and you are known. He talks about turning your phone off, that doesn't protect you. A smart phone has 2 cpu's. The one that operatea the smart phone and the SIM card. The only way to turn off the SIM card is to remove the battery, which most modern cell phones don't allow. The SIM is "pinging" (not the ping command) nearby cell towers every few seconds. This means that every devIce with a SIM is continuously located. Most modern cars have a SIM.
@rpm10k.
@rpm10k. 11 ай бұрын
A sim card is not a CPU. The second CPU in a phone is the baseband aka modem
@Slackware1995
@Slackware1995 11 ай бұрын
@@rpm10k. If you google "SIM card" you will find out that it is also known as a "UICC" or Universal Integrated Circuit Card. You will then find out that the UICC "consists of a CPU, ROM, RAM, EEPROM and I/O circuits." You may also find some XRay pictures of a SIM card that show the tiny little cpu in it. Phones are starting to switch to "eSIM" cards, which just means that the separate cpu in on the phone and can be 1 or more virtual eSIM's. The baseband processor is not a modem, although it can provide modem functions.
@Cubic_cat
@Cubic_cat 8 ай бұрын
​@@Slackware1995thanks for the info about CPU in the sim cart, but I saw an interesting line in your comment, "Use a private DNS server". What do you even mean by that?
@hitmax087
@hitmax087 5 ай бұрын
@@Cubic_cathe meant that whenever you need to get an IP of resource you go to DNS server, which resolves names to IPs. If i manage to point you to my DNS server or hack current one, i will be able to fish your credentials from fake facebook for example. Did you catch a point?
@allanlloyd6668
@allanlloyd6668 3 ай бұрын
You must not have heard of faraday bad or wrapping device in tin foil
@Kiddos4Artoons
@Kiddos4Artoons 3 ай бұрын
Damn Mr Anonymous sounds like DJ Vald his cadence and even his laugh just makes me feel like it’s him especially how he works with the Feds and would be the perfect guy too be in cybersecurity 😂😂😂
@rbgtk
@rbgtk 8 ай бұрын
Great tip for traveling with phones: get a Faraday pouch, it blocks all signal to and from your phone Edit: it was mentioned later in the video, nvm my redundant information
@klwthe3rd
@klwthe3rd Жыл бұрын
These statements about whoever controls the last node on a Tor circuit, controls the network, is in sharp contrast with Dr. Mike Pound's(who appeared on this channel) video on the Tor network. Dr. Mike Pound states that if you control the last node and the Guard node(the first node), yes it's possible but VERY VERY hard to work your way back to the originator of the traffic sent. Occupy the Web makes it sound like it's could all be done from the exit node. This is blatant hyperbole and sensationalism. Dr. Mike Pound is one of the premier professors on the subject. I'm more encouraged to believe him over anyone else. Also, If the Tor network was that easy to compromise the identify of people just by controlling the last node, it would be useless.
@PaulWhealinglive
@PaulWhealinglive 2 ай бұрын
100 % bro. OTW bends the facts a fair bit. Like all his facts
@hunglikeahamster
@hunglikeahamster 28 күн бұрын
I worked for a security company for a while. Some of the guys there used to host tor nodes specifically to monitor the traffic in order to see what hackers were doing now. Just to keep ahead of the game. In fairness to this video. He didn't claim that controlling the exit node gives you the user's IP. But like he said, that's only one way to find you.
@klwthe3rd
@klwthe3rd 28 күн бұрын
@@hunglikeahamster How does hosting a Tor Node allow someone to see what "hackers are doing"? The traffic is encrypted and those people would NOT be able to descrypt anything since they don't host the node before or after the one they are monitoring. What information are they going to decipher from that monitoring??
@MaramRohan
@MaramRohan Жыл бұрын
David, you should be proud for putting out such content!
@rxtechandtrading
@rxtechandtrading 11 ай бұрын
hes good , beter than most
@user-ml8gt7dy6v
@user-ml8gt7dy6v 3 ай бұрын
This stuff is interesting.really knowing this allows u to understand how easy it is for ppl to get you so protect ur info
@daivomjoshi8677
@daivomjoshi8677 3 ай бұрын
Is it safer to set the exit node of TOR in a country like Iceland or Switzerland because of the data laws there?
@ToyMachine22122
@ToyMachine22122 11 ай бұрын
14:30 surprised he didn't mention Brave browser's option to block cross-site cookies here. By blocking only cross-site cookies (and still allowing same-site cookies) you can prevent websites from profiling you, without sacrificing functionality in the vast majority of cases.
@wildkoala1034
@wildkoala1034 11 ай бұрын
28:40
@Merble
@Merble 11 ай бұрын
or Firefox, which also pisses off Google so win-win-win.
@LAIDBACKMANNER
@LAIDBACKMANNER 6 ай бұрын
@Merble Sure... But firefox developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation.
@andrejapolenik8606
@andrejapolenik8606 Жыл бұрын
Ooooh again this top duo. Love when youre doin interview together
@davidbombal
@davidbombal Жыл бұрын
Thank you Andrej! Definitely want to get OTW back more often!
@andrejapolenik8606
@andrejapolenik8606 Жыл бұрын
@@davidbombal can't wait. Gonna listen this excellent podcast
@cinna1351
@cinna1351 3 ай бұрын
I always go straight to the email recommendations cause you can tell the validity of their information. Proton mail has forked over information to the police before. They also took out that they dont track ips out of their tos. I would recommend to take his information with a grain of salt. He does have some good information, but I would say that you could do better.
@Graymorg
@Graymorg 8 күн бұрын
Can u recommend a better email? And why they're better, please
@user-mb3su1hv8z
@user-mb3su1hv8z 3 ай бұрын
The guest is incredibly intelligent and has great insight! Thank you for having him on the network.
Hacking Tools (with demos) that you need to learn in 2024
1:27:34
David Bombal
Рет қаралды 525 М.
What's the Future of AI in Cybersecurity and Hacking (are we doomed)?
43:37
YouTube's Biggest Mistake..
00:34
Stokes Twins
Рет қаралды 60 МЛН
Когда на улице Маябрь 😈 #марьяна #шортс
00:17
Stupid man 👨😂
00:20
Nadir Show
Рет қаралды 25 МЛН
Hack like Mr Robot // WiFi, Bluetooth and Scada hacking
45:23
David Bombal
Рет қаралды 2,1 МЛН
Your VPN won't protect you 😱
1:03:25
David Bombal
Рет қаралды 70 М.
Python The Hacker's Secret Weapon | Importance Of Python in Hacking
11:06
How to Get a Private Phone, Number, and Cellular Data
10:00
Mental Outlaw
Рет қаралды 896 М.
Do you realize that they are watching you? Protect your online privacy
1:01:57
6 Must-Have Security Gadgets That Fit in Your Pocket
9:03
All Things Secured
Рет қаралды 1,7 МЛН
Is Skynet watching you already?
1:04:00
David Bombal
Рет қаралды 1 МЛН
How To Disappear Completely and Never Be Found
14:20
Sumsub
Рет қаралды 3,8 МЛН
Android Bluetooth Hacking
35:39
David Bombal
Рет қаралды 46 М.