Here is my other channel with nature related content: youtube.com/@halldenlogs3445
@sumrandomguy4860 Жыл бұрын
Hey, I got a quick question. Does it make sense to use both a VPN and Tor browser at the same time?
@mrcx6142 Жыл бұрын
My issue with password managers is always - how secure are they? If they get busted, all of my passwords are, that's my thought process.
@darkones4370 Жыл бұрын
@XfxPro650W heard the same before. Is Mac better overall?
@Plastik13 Жыл бұрын
@@sumrandomguy4860 VPN is worthing 0 because if the VPN company gets served with a warrant, they will have to comply and give your own personal IP address.
@deadlyhacker991isback Жыл бұрын
youtube.com/@deadlyhacker991isback
@removedaccount68633 жыл бұрын
He didn't only tell us how to be anonymous. He also taught us the basics to be safe on the internet that most of the people don't know about.
@kenshin57273 жыл бұрын
HAIII BABUNIII YOU ARE RIGHT
@removedaccount68633 жыл бұрын
@@abhisheksathe123 I just kept it Short Brother. You should understand it. Overall tryna act cool is not good bro. I know what the title says. I ain't high. And I ain't telling something bad brother. Thank you.
@removedaccount68633 жыл бұрын
@@kenshin5727 Awww Honey bun amal babuni taa!! ALIGATOUUU!!
@removedaccount68633 жыл бұрын
@thefallenshadow why you ask? Yeah obviously
@69axfahmid823 жыл бұрын
@@abhisheksathe123 STFU
@engboy693 жыл бұрын
Now I can be as invisible on the internet as I was in high school
@gorg2123 жыл бұрын
Lol
@minineji70503 жыл бұрын
Lmao
@Hallden_3 жыл бұрын
Hahah nice
@Solitudal3 жыл бұрын
ouch, this cuts deep
@kailuhamichalakis37973 жыл бұрын
Oh dude how I feel you on this
@primorock81413 жыл бұрын
This video went from basic internet safety to getting away as a crime boss real quick...and I like it!
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@thahrimdon2 жыл бұрын
@@satoshinakamoto7253 Tails is the GOAT one of those things where if you know, you know
@weikopan20362 жыл бұрын
Wait ! you forgeted tor and proxy server
@thahrimdon2 жыл бұрын
@Mikey Yessir, a lot of them are usually with removable media but you are correct.
@holmes68782 жыл бұрын
@Mikey Whonix is also a good option without flash drives
@ethanpatrick2 жыл бұрын
"I can remain unseen if I wish, but to disappear entirely: That is a rare gift." - Aragorn
@gnrlyj5 ай бұрын
or we can just die ⚰️
@1n33dw4t3r5 ай бұрын
@@gnrlyj bro just 💀
@womanofGod6412 ай бұрын
🤣🤣🤣🤣
@d.Cog420 Жыл бұрын
A couple of other ways: post letters; communicate with people by going to see them; shop by going to local stores; bank by going to the bank (if there are any left); grow what you can (salad stuff is easy and you can even grow it in an apartment); slow ourselves down, get off the click-shop, rebuild communities. Get on two wheels to move around: scooter for short distance, then pushbike, e-bike, motorbike. All good for the planet and us (careful on the motorbike). The internet has only been around for a tiny amount of time yet we now spend all our time on it (like me now). We could try getting out a bit more. Might be good for our mental health too as well as physical. For all internet uses though, do what Hallden says.
@mikeoxlong40433 жыл бұрын
Plot twist: he is a government agent making it easier to track us
@RS-xx8gz3 жыл бұрын
It is
@Drake-E3 жыл бұрын
duh
@TooooooooooNify3 жыл бұрын
he didn't even like your comment like everyone else that made it to the top. you might be onto something.
@theencryptedpartition46333 жыл бұрын
You gotta go to China or Singapore or Hong Kong and wear mask, and you will just look like anyone on the street. No racism, just saying. I am Asian myself. When I wear Clark Kent Glasses, no one recognizes me and some mistake me with other person.
@mukulsharma57383 жыл бұрын
no he isn't ..but looks like you are ..now that's a good plot twist!~!
@seekthuth2817 Жыл бұрын
Extra added layer of security you can add to your passwords is to have your passwords in a foreign language, like Spanish or (romanized) Chinese. The further from your mother tongue and the less popular, the better. Good example is to find a band like The Hu that sings something like Mongolian, use a romanized version of a line from one of their songs, and then encrypt it.
@MTyler8787 Жыл бұрын
I wonder what this guy’s password is..
@what.anything Жыл бұрын
that's a good idea sadly most sites allow only english.
@seekthuth2817 Жыл бұрын
@@what.anything Yeah, that's... that's why I said use a romanization of your specific language. I'd be shocked if a website allows you to use 咖啡因眼淚 as a password, but you can just use the pinyin for it, "kafei yin yanlei" and then encrypt it by changing like the K, and the N's to like a 7 and some #'s. Can do this with basically anything you want to just by going to Google translate (its inaccuracy being a benefit here) and writing down the Roman letters it puts for the pronunciation aid. It's super easy, though I would recommend putting it on a piece of paper just in case Google fixes a blunder it made that just so happens to Thanos snap your password out of existence.
@johnmoyers4043 ай бұрын
I’m not sure I would trust this likeable but naive guy
@jjj-xd9nw2 ай бұрын
You just exposed me 😅😢😢😢
@3dinterface682 жыл бұрын
Couple things not mentioned is to shut off your telemetry data inside your OS. Normally a stealth system requires this and should read "Your system has achieved a perfect "TruStealth" rating. Not a single packet - solicited or otherwise - was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice." You can also shut off netbios over tcpip in your adapter settings so you are not broadcasting, and hiding your ssid so you are not broadcasting your connections name through wifi discovery.
@ShinyEmeraldGames3 жыл бұрын
Really great and helpful video. Online anonymity has become more and more important for me over the last couple of months.
@Hallden_3 жыл бұрын
Thank you! Appreciate it!
@helgin_lol2 жыл бұрын
@@kallehalldenassistant7578 lol
@qzxsounds123qzx42 жыл бұрын
@lafondawilliams2 жыл бұрын
months try years
@SavathunSussyImpostor2 жыл бұрын
@@kallehalldenassistant7578 Scam call center 👀
@user-ew5vj1sl1u3 жыл бұрын
Wow, multiple book level knowledge condenced into a 24 min video. Absolute legend.
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@Void_from_Abyss Жыл бұрын
@@satoshinakamoto7253 what are they? Please briefly explain
@ABC-jq7ve Жыл бұрын
You’re spelling your name wrong in Japanese. You need a う after the りゅ if you want your name to say “Ryu”. Also note, using hiragana will make you look more like a preschool child or a teenage girl than an adult. But if you make it kanji, the Hayabusa part is already kind of cringey, so it will make it look even more cringe. I’m Japanese. You’re welcome.
@SADS-hm3qe Жыл бұрын
wtf@@ABC-jq7ve
@Hallden_3 жыл бұрын
Hope you like the video! Been researching this topic for a while now. Also feel free to leave a comment if you know of better ways to do anything that I said or if I missed something! That’s just really useful if !subscribed: print(”What are you even doing mate, subscribeee”) subscribe() else: print(”Heyyo”)
@domzymonz3 жыл бұрын
Heyyo!
@RandomGuy-ws8cy3 жыл бұрын
Heyyo
@KB-pk5ze3 жыл бұрын
Heyyo
@marcv6103 жыл бұрын
Heyyo
@marcv6103 жыл бұрын
@HotBBQSauce you can do that ?
@AwokenEntertainment2 жыл бұрын
It's crazy how much privacy people give up for convenience..
@silentking50802 жыл бұрын
Not really i don’t care if business have my information they have millions of others also I’m not some dark web hacker so I don’t need that much privacy
@atroxiv2 жыл бұрын
Yeah bluntly speaking I don't care if someone knows my name/ where I live as long as they 1) obtained that information from me. 2) are not freely giving it out / selling it. 3) have it stored in a secure manner.
@kon64922 жыл бұрын
@@atroxiv but they are not safely stored and are selling it
@atroxiv2 жыл бұрын
@@kon6492 Most of them safely store it, I dont give it to those that have a history of breaches etc. And I also dont give sensitive information to companies that dont promise to not sell it.
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@Dre_GadgetCravesNmore2 жыл бұрын
Am not gonna lie, i sat and watched this whole video and this guy spoken everything pertaining to becoming truly invisible online. He didn't miss anything out, this is literally the sauce explained yo👏🏼👏🏼👏🏼 well fu*king done❗️
@mht5875 Жыл бұрын
It is so important to police yourself online - never use your real name anywhere, never post a photo of yourself, never give out your exact location. If you use social media, again, use a "sounds like a real name", keep everything turned to Private.
@strykertron2325 ай бұрын
Good method is to take the first name of a president and a last name of another.
@s4br32 ай бұрын
@@strykertron232user barack trump would like to have a word with you
@markksantos3 жыл бұрын
Can you show us how to remove ourselves from all these websites that show your address, phone number etc...?
@Brukrex3 жыл бұрын
Impossible
@TaioCruizeVEVO3 жыл бұрын
unless your name is Harold Finch you will not be able to do it ;)
@jovan04543 жыл бұрын
Don't give them that information
@MaoYu233 жыл бұрын
You have to do it one by one, it's not easy, but it's possible, i did it and i feel so free now !
@xE92vD3 жыл бұрын
You can issue a case if the website put your personal information without your permission
@wakeupuk38602 жыл бұрын
Been in IT since 1982 and in theory this is an excellent video and I commend Kalle for doing so especially unlike a good deal of IT KZbinrs on here, who mainly want to show off, get attention and aim for sponsorship plus he does not hide it requires having the knowledge, effort and time to do so. Unfortunately as is with so many IT professionals I taught in my time, simply can't grasp that non IT people just want to 'use' IT to do what they want, as oppose spending additional time and effort in being able to do so. That is why even though we have so many utilities and techniques to make passwords more secure, people as I even do (and I used to teach security) now keep a small book with them all written down as we have to change them on an irregular basis. Just like a neighbour I once had, who never actually used his car (driving his wife mad) as he was always tinkering with it, in his garage, to make it run better. The other thing is that most users who wish to use all the aspects of the Internet now find to do so, have to abide by the rules, wishes and requirements that are for the benefit of the provider not the user. A classic example is how banks have totally reversed the relationship, where once customer was king to them now. Kalle's suggestions are valid but most major websites know this and have paid IT software and hardware developers to creat 'hoops' that we must jump through to use them which if you have sensibly carried out what Kalle has stated you 'AIN'T GETTING IN'.
@jum52382 жыл бұрын
There's another couple of aspects he doesn't cover. Tracking by apps, and cross-correlation of your information with other people. For instance, how many people have your phone number, and have entered it into their phone listings? And do they have utilities and apps that they use to make their lives easier and allow them to share their phonebooks with them? Or their contact lists for email? What about apps that you may have in common with your burner phone and your normal phone, despite not having them on in close proximity to one another? Oh yeah, there's also an algorithm that is used by intelligence services that correlate one phone turning off and another one turning on in close proxmity both spacially and temporally (time). And what about patterns in common? Do you have a group of sites you like to visit and are used on each phone/computer? Would your browsing history get scraped by malware? Do you pay bills online for utilities locally near you? Have you noticed that credit card transactions require phone numbers? And license plate readers and facial recognition, as well as gait tracing (the way you walk) can be used to identify you under a ubiquitous surveillance environment. Some interesting concepts covered in the show "Person of Interest" where the surveillance of everyone is a goal by intelligence agencies.
@justanotherhuman3668 Жыл бұрын
@@jum5238 how would you get around that?
@Skaggs666 Жыл бұрын
@@justanotherhuman3668 here's what I've (hypothetically would) have done over the years to avoid those exact techniques @Ju M mentioned: my phone had a pretty predictable pattern. At 10PM it would enter quiet mode and that silenced notifications and I'd typically put on a UFO doc to fall asleep to. So from the outside looking in, I was asleep. I always used burner laptops/phones/hotspots to conduct business and swapped them out frequently. Laptop had Tails (no Windows/MacOS/etc). I never downloaded Tails from a machine or browser account linked to me and always used a fresh download on a new USB every time I swapped laptops. Some will say that is overkill. I would retort that person never took a 500-600 computer forensics course. Business was always conducted during sleep mode and I left my smartphone at home and went to truck stops (Flying J, Loves, TA, etc). My burner never got turned on until I arrived. Obviously I was using TOR unless the latency was too much for what I was doing at the time was rare but did happen. I'd never stay longer than 2 hours even if I wasn't done. I'd go to the next truck stop if time ran out. I went to well traveled truck stops, ones that were busy all night long. The more crowded the better. I had a coin and dodecahedron (D12) dice that I'd flip/roll to determine which of the 24 truck stops I frequented within 150 mi of my house I'd be going to. Heads was the number on the die, tails was 2x the number. I did that so no pattern could emerge and I never went inside to buy anything or go to the bathroom nor did I buy gas. All the BTC I used came from Local Bitcoins (RIP). This was long before Monero. Before BTC, it was forums like Shadow Crew and trust lol. Hypothetically.
@netsaosa4973 Жыл бұрын
?
@smokeygaming356510 ай бұрын
Yip yap i aint readin allat
@Mohammad_Ali__2 жыл бұрын
It is tough to prevent data being tracked and hide info. Literally just whatever it may be related to the person (especially personal information) that is used for any purpose can blow one’s personal information and status. So far this is the best video I’ve seen and one of the many that is useful which I learned from.
@azamean Жыл бұрын
I recommend changing your email occasionally too, it's very easy with outlook/Gmail to add an alias email, make it primary, and delete your old one. So if your email has appeared in any data breaches, it's gone. But you still have access to everything with very little effort
@The_Lovey_Informer18 сағат бұрын
Best of both worlds. Invisible in society and now on the web
@giosaia3 жыл бұрын
10 year olds that feel like being a hacker would be awsome be watching this vid over and over. 😂
@RohakGaming3 жыл бұрын
@@kallehalldenassistant7578 didnt ask dont care
@Miloeren123 жыл бұрын
Awsome
@jurivjerdha24673 жыл бұрын
@@RohakGaming with that profile pic the only thing you do is ask and care for other peoples stuff
@RohakGaming3 жыл бұрын
@@jurivjerdha2467 it was a bot who was promoting a fake scam link. Would you not say anything?
@jurivjerdha24673 жыл бұрын
@@RohakGaming oh now that i reread who you @ and how his comment isn't available it makws sense. Thought you said "didnt ask dont care" to the first main comment .
@internetgurutv3 жыл бұрын
No one is safe online.. But good thing there are online angels like you. Thanks for sharing these tips 😊👍
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@sandy7m2 жыл бұрын
Liked the video. The password creation system was good. I was taught a system many many years ago. Name Number symbol(s) First step is choose four names. They can be a name of anyone you know preferably, the first names of Grandparents or Aunts or Uncles or long lived pets like cats or dogs. The names must be at least 6 character's or longer each Look at the four names and notice which letters are common between the four. Each name must have at least one character common to the two we will choose (for example the letter O or E) If one of these names does not fulfill this rule then find another name. With all four names you have the first part done. Second step - Pick four numbers you can remember They will represent the year and month that someone was born that is in your family network. Look at the four numbers and notice which characters are common between the four numbers such that each number has at least one character (for example the number 3 or 2) Third step - Choose two special characters. Pick ones that are in the same place with the most common types of keyboard that you will use. In this example we will have ? and > Avoid using things like full stops and commas as they are difficult to see Next you need to establish a substituion rule for the characters so you can disguise the passwords. For my example I will choose - o and 3 and ? will be replaced by ** e and 2 and > will be replaced by == Always use two or three substitution characters together. Never just the one. I now keep a small notepad with the four names and four numbers. But use the disguise substitiutions in those names and numbers when writing them down. When a password is created it will always consist of the name first, followed by the number with the special character(s) at the end. Now we will say that we have made up a password from my grandad's name and my fathers birthday with the special character ? from my choices Fredrick0259? On the website I will enter Fredrick0259? To keep a record of this I would write Fr==drick0==59** Now, if anyone comes across Fr==drick0==59** in my house, work (or on my phone) they do not have the actual password. You will need to create at least two passwords. The first one is for social uses such as email and Facebook. The second one is for cash websites such as paypal or banking. Once a year I change out the passwords. Although I have gone longer. The names and numbers are writen in a small notepad. I also keep a copy of this in my phone. The special characters are kept in my head This notepad will also have the old passwords in case I forget to change out a password for a site after not having been their for years. To create a new passsowrd I pick another name from the list and a number (they are chose at random). Then choose the special character(s) to end it. The final trick with this system is that I can create shorcuts on my PC with the name editied to include the disguised password to act as a hint. The shortcut might be labelled as My Gmail - Fr==drick0==59** With these shortcuts copied to a memory stick I can have online access at any PC with the passwords easily to hand. I have been using this system now for nearly 15 years. The same four names and numbers. Once you get used to it there is no need to worry about remembering passwords current or way in the past. To show how well this works - Using the example above. What is Ge**rge0==64**== It is worthwhile noting that this whole system can be reversed and still achieve the required list of passwords and maintain security. You would now write the undisguised passwords in your notepad and on your shortcuts. The disguised passwords would now be used at the website.
@marilynnelson4718 Жыл бұрын
Looks good but Fredrick and George can easily be deciphered . Guessing 1 number easy. Yeah, the question mark - they’re able to run info quickly. I think you were lucky you didn’t get hacked…. Right direction- just need more.
@mikeoxweld86042 жыл бұрын
Nice upload, succinct yet easy to follow.... Highly recommended for anyone else with a short attention span or others who may have naively spent years feeling they have nothing to hide.... subsequently allowing many years of social-media voyeurism erode any belief in, or concerns for online privacy in 2022. Much appreciated!
@leesweets41102 жыл бұрын
I used to do my passwords like you describe. I had a handwritten list of 1/3-passwords for every site or service. Another 1/3 of the password was derived from the hostname or domain name of the site, and the last 1/3 of the password was a constant I had memorized. I had a mental algorithm for mixing them together. Then I found a better way. I just had raw passwords written down for each site. I would then truncate its 256 bit hash down to size, and use that as a high entropy "random" alphanumeric password. Then I discovered offline password manager. Their database is encrypted with a main password (which I handled as before). But each sites individual passwords contained therein were randomly generated ascii passwords. They also store TOTP keys to generate 2FA codes as an authenticator app. They also store direct url links so phishing becomes an impossibility; never sign in through any link other than the one you stored in the manager. You can also get creative and have an independent, memorized password (just a character or two) that you can prefix to the password stored in the manager. Ive even encrypted my entire password manager into a veracrypt volume.
@VeronicaGorositoMusic3 ай бұрын
Yes I use Bitwarden's pass generator, and implemented some weird systems for memorizing 128 character pw's. Just a part, then I combine both. Also I use long complex pw's + biometrics.
@saturn53122 ай бұрын
Why don't you guys just post the password here too😂
@DieStockEnte3 жыл бұрын
I use hash encrypted passwords. For example I want to use "the final countdown" as password, then I encode it with sha512 or sha256. Then get a long hash and I use it as password. Only I know the "real password", which I am easily able to remember and to encode with sha512/256 to the password I use on web. Cool video! 👍🏻
@dhay39823 жыл бұрын
That means that your password is "real password" + "fake password" + your encryption algorithm. Not bad, because some hacker would need to put 3 unrelated info together to break the security.
@netautorisationnetautorisa5453 жыл бұрын
@@dhay3982 *WE DO NOTHING !!! THE PC DO 99% OF "DECHIPER"* *EVERY PASSWORD IS A JOKE* *EVERY PIN IS A JOKE* *THERE IS **#NONE** SAFE THING ON A "COMPUTER" ...OK* *THE POINT IS ....* *DO NOT WRITE "ANYTHING" ON "COMPUTER* *...... WHO CAN GET YOU SELF KILLED .......* or *...... CAN GET YOU #30 YEARS IN **#JAIL** ....* *(NEVER ..OK !!)* *THIS IS THE "ONLY" 2 THINGs TO **#REMEMBER** !! FOR LIFE* AND I KNOW A "LITTLE" ... ABOUT #IT .... oooh WHAT is .....this .!!.. (clash of clans) (club penguin) (no end) HAVE A GOOD DAY ... YOU
@farhanjarif5033 жыл бұрын
Extremely complicated passwords need to have more time to decipher, nevertheless the hacking never stops.
@pablochocobar0743 жыл бұрын
@@netautorisationnetautorisa545 **CAN you EXPLAIN me why you WROTE** it like that? And why did you **put** random names in **THE end**
@brazy50062 жыл бұрын
The better advice would be use strong passwords + MFA, and you're almost impossible to hack if you use your brain a bit.
@Just.kid193 жыл бұрын
This Is The Man I Have Been Searching To Mentor Me. Hail Kalle Hallden🙌🏼🖤
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@bringbackdislikes31952 жыл бұрын
@@satoshinakamoto7253 Shut up
@jewelflores41053 жыл бұрын
I'll try the multiple email and longer password, thanks Kalle 🙂
@Hallden_3 жыл бұрын
Yeah highly recommend it!
@jumpergamer19133 жыл бұрын
@@Hallden_ thanks for the video, now i can commit war crimes
@koranhama48372 жыл бұрын
@@jumpergamer1913 go ahead comrade
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@Hungrymage2 жыл бұрын
I used a password system where you think of a word and just add the date of that day in front and the state you're in(as in drunk, happy, sober, etc). This worked for me so far
@hamfahimkabir Жыл бұрын
Becoming anonymous is really, really hard. All that things you said works only if you're trying to avoid corporate companies. YES corporate companies. They will have a hard time figuring who you are and making your profile stronger. But government and sometimes other companies will track you down anyways. It might be the way you type or other patterns you follow. And avoiding cameras are also very much impossible. Remember you walk in a certain way. You have favorite coffee or drinks. It's not hard to track you down.
@OneBiasedOpinion Жыл бұрын
This was about digital invisibility. Not literal social invisibility. There’s a video on _that_ topic made by a former CIA agent and it showed just how much more difficult it is to absolutely vanish altogether. Most of it had to do with eschewing the digital environment completely, going cash-only, and mostly being a complete loner.
@fivr. Жыл бұрын
nah just buy a whole outfit with cash through people you know, walk with rocks in your shoes into a starbucks with the anonymous clothes + mask and hide the raspberry pi, after that just stay on a VM or RDP with your proxy/vpn (preferrably mullvad vpn) when commiting crimes, and try to stay on TOR as much as possible. also change your cybercrime persona around every year or two and get completely new proxies. if you manage to do this without doing anything dumb like posting pictures anywhere you'd be very near impossible to track through governments. the only way to get you would be through opsec fails or through investigation of where your money comes from, but even if they raid you make sure to have your whole PC encrypted through veracrypt. remember all this is a bit overkill if you arent making over 1m/year or more through cybercrime, if your making less then that feds wont really care unless you really make a name for yourself in the time you spend building your personas or if you threaten national security. so nah tracking you down through the internet would be pretty hard for the government if you try hard enough
@Mr_Anubis Жыл бұрын
@@OneBiasedOpinionsend link to me
@zajlord29303 жыл бұрын
i mean the last level could be used against some creeps from like darkweb or someone you made mad. For example if you knife someone in csgo he wont be able to trace your home
@Sarahhh1233 жыл бұрын
not csgo lol
@bringbackdislikes31952 жыл бұрын
When you type "gg, close" when you destroyed them 16-0
@GKNaidu-hb5zv3 жыл бұрын
you should definitely make a video on setting up a proxy by ourselves at public wi-fi's..like starbuck,stations,etc...
@micropanda79163 жыл бұрын
@@kallehalldenassistant7578 Lmao you seriously try to lure people into scam using channel that is about tech? (I mean, u probably won't answer cus it's bot but still lmao)
@aguiar.81813 жыл бұрын
@@micropanda7916 ?
@aguiar.81813 жыл бұрын
@@micropanda7916 just because someone doesn't have any videos doesn't make them a bot...
@warzone26203 жыл бұрын
@@happystarthe3rd hm not really u can just duel boot kali or whatever os u want. its what I do
@happystarthe3rd3 жыл бұрын
@@warzone2620 Yeah but for people new to this stuff is probably scarier and they feel safer using a virtual machine
@AUSTINREAL168 ай бұрын
I needed the part three of your video . Thank you soooo much
@defaltatdenswagamhaven21426 ай бұрын
In addition use a satellite dish to connect to (public wifi) proxy 🤝
@joojlejoojle14382 жыл бұрын
The video is great! Just want to add that you can create Gmail accounts without phone number. On signup on a new (or after factory reset) Android device, while setting up, you can create a gmail ID without giving a phone number. Also temporary disposable email accounts can be of great help where you only need to create account and use only once
@andreagualandris24623 жыл бұрын
really great video as always! I love how you trigger the interest with some general interesting thumbnail and proceed to explain it in detail in the video. Keep up the good work man! Love from Italy
@kallehalldenassistant75783 жыл бұрын
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,...... ,,,,,
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@lyfandeth2 жыл бұрын
Using the plus symbol + for concatenation in email addresses IS actually formally part of the standards, making it easy to create one purpose email addresses. But major ISPs like Goggle will reject these. Goggle also ignores using a period . as a separator despite that also being a required standard.
@wojtekpolska10132 жыл бұрын
what are you talking about? first of all, Google is not and never was an ISP, second, they absolutely do allow you to use the + character in gmail, so idk what are you talking about
@mineatomtr Жыл бұрын
@@wojtekpolska1013 he said Goggle not google bruh 🥶💀 when blindness intensifies 💀💀💀💀
@chichung8882 жыл бұрын
One of the biggest problems for remaining private is Hardware,Software,Program,File,Data Fingerprinting. Giving misinformation is the best way but it's getting harder to do, if you have not already done this like 12 years ago then it's to late now. If your face is not on line now then put it on line, after you have tweaked you picture so it still looks like you but AI cannot match it to you. You need to put out your misinformation as soon as possible so it's accepted as you, then when it securely given without you consent to others it's then accepted as you and gets imbedded as you in the system. Then until your misinformation is 100% removed from the systems so it cannot be auto replaced by any system you are a lot safer. It's way better to hide in the crowd than hide on your own, It's only secrete if no one else knows.
@leroy3086 Жыл бұрын
You try to hide, they try to find, like a snake bites it's tail "how to completely disappear a drop of water? Dropping it into the Ocean"
@growing367 Жыл бұрын
2:50 3:15 4:09 can remember 4:55 6:30 7:40 pw manager 9:10 stop giving out details 10:15 create multiple emails 13:05 TOR 14:45 tor 15:30 Signal 17:10 u trackers 18:38 proxy 21:00 surveillance 21:30 burner 22:00 gmail 22:25 never search
@guruoo Жыл бұрын
I like your layered approach to online opsec.
@SamarthCat2 жыл бұрын
To create your own proxy you can rent a VPS server somewhere in the cloud and all your internet traffic will appear as if it came from that VPS server.
@TsukiNoInu938 ай бұрын
yeah, but how will you pay for that? 99% of online banking require passports these days
@JacobP812 жыл бұрын
8:39 If you don't trust a password manager you could just use a password protected encrypted folder. A lot easier then building your own password manager. Only problem is virtual memory could cache the data in plain text on the hard drive.
@antique9032 Жыл бұрын
win10privacy has a option where it clears out the virtual memory sheet everytime it boots down
@SulaimanBotha3 жыл бұрын
I see you're experimenting with longer form content...I'm not complaining though😂
@kallehalldenassistant75783 жыл бұрын
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}......
@daedaluxs2 жыл бұрын
Cool lil thing for emails, you can sign in with all your emails on mobile (up to like 10), and search all inboxes when looking for something.
@CloudySheets2 жыл бұрын
Could you make a video about erasing your online identity? Like the process and steps it would take to delete as much info about yourself that on the web available so its easier to become invisible without much worries
@Chad_Fishy2 жыл бұрын
Let's be real if you clicked this video you need to apply these skills immediately, cuz your getting put on a list after clicking this video
@zanetbutane87422 жыл бұрын
lol its a joke but its also not a joke. I've been coming across so many other serious issues that have that same affect. My fault you didn't even say it was a joke - I guess its just the idea that many people will read your comment and assume it is a joke
@AHeroWith1000Names Жыл бұрын
Yamete kudasai FBI agent~kun
@StonedNoob3 жыл бұрын
This went from 0 to 100 real quick 😂 Like from tips to be secure on the net to outright being a cyber criminal. Like tips on how hide your face and stuff lmao
@atroxiv2 жыл бұрын
Hide your face, steal bandwidth and power from the local starbucks et al.
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@HimanshuYadav-nt9zp3 жыл бұрын
Every time I watch your videos, don't know why I feel next video will be music production video😅 such a versatile guy
@kallehalldenassistant75783 жыл бұрын
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}.......,,,,,,
@linuxjodi43112 жыл бұрын
You mentioned keepass!❤️ Subscribed..
@fridaber60692 жыл бұрын
Finally a video that even I, a non-IT-expert, could understand.
@aephemerial3 жыл бұрын
Here we go!
@Hallden_3 жыл бұрын
First!
@csr25373 жыл бұрын
2nd
@agamjotsingh73713 жыл бұрын
Third!
@jxkc.39413 жыл бұрын
Fourth!
@gus.stviaaa3 жыл бұрын
Fifth
@BenKenobi12310 ай бұрын
As you have mentioned the trade-offs of enhancing security at the expense of user experience is what will keep people away from these practices. I find myself in that group of people because I want a good time and I have nothing to hide. Anyways, I do use a password manager (because it’s just easier) and a vpn (to get content from the other side of the world). Thank you for the suggestion about multiple emails I could use it for separation of concerns purposes
@brandonhughes6452 жыл бұрын
I would just add being aware of threats and always looking for them. Obviously phishing attacks are very popular atm. We done a phishing test on our workplace and far too many people clicked the links.
@kek207 Жыл бұрын
Stealth Phones are also an Option. You can buy them from some trusted companies, and this is the most important step. They change your IMEI, connect to the furthest cell tower possible, making it impossible to triangulate you, they do not have any hardware IDs and do have encryption features. However you're essentially paying 600bucks for a tuned Nokia, which is safe Edit: It also doesn't offer internet access, updates or anything of that sort
@Cobra-yo7fx2 жыл бұрын
I found this channel and this video from the main page of KZbin on the safari version on my iPad Pro! Nice video!
@swapnilgarg28293 жыл бұрын
Strong password is like sheldon creating long password for pennny. 😂
@mohamedirfan28163 жыл бұрын
Analogies are on an another level 🔥
@andreaslam3 жыл бұрын
Plot twist: Kalle isn’t Kalle
@kallehalldenassistant75783 жыл бұрын
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}......
@Xaminn3 жыл бұрын
Kalle Linux
@joestephani79592 жыл бұрын
I upvoted because you mentioned the final countdown
@danielo25412 жыл бұрын
I'm impressed that the US haven't tried to remove this video from KZbin
@ayva11062 жыл бұрын
When I make really long random passwords I just memorize the rythm of movement that I make when I'm typing the password out. I don't know half of my actual passwords but I know the hand movements for them :)
@LakadMatatag27022 жыл бұрын
The problem is if you don't access that site regularly then you can't have muscle memory for that site, so you may forget the password of a site that you haven't accessed for years.
@ayva11062 жыл бұрын
@@LakadMatatag2702you'd be surprised... I've recently logged into an account that I hadn't touched in two years and I typed the password as if I had been doing it every day. Muscle memory lasts a long time 😌
@darkenedvision47092 жыл бұрын
good for you, not everyone is that kind of mutant. I work construction and go hiking in my free time. I don't have time for all that craziness.
@VeronicaGorositoMusic3 ай бұрын
@@darkenedvision4709 hahaha 🤣👌🏻
@wisniapilkarski Жыл бұрын
I have never seen such a professional and transparent video in my life
@samarmohan98913 жыл бұрын
The 9 people who disliked are the hackers who want to see everything you do on the internet.
@JohnSmith-gd2ws2 жыл бұрын
No those are the people who are pulling their hair out from him recommending paid cloud based closed source password managers after he scared people with the idea of remembering hard passwords instead of jumping to the subject of self hosted or offline open source pass managers such as bitwarden or keepass. Or him telling that the exit node on tor can see you and you need a proxy. No they can't that's the reason why you are routed thru 3 random computers ran by ordonery people from home. Those are also proxies and they are not hiden in a random starbucks (What TF) Trafic is deencrypted and reencrypted on each node. Nodes owned by the same person are not allowed to connect to each other and get black listed if they do. Also evil exit nodes are non existent and even if they dont get insta banned before verified they wont be able to do anything anyways But that no concern anymore seeing dislikes since youtube is a crybaby over rewind and hated goverments and companies are also angry over seeing crap ton of dislikes
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@bringbackdislikes31952 жыл бұрын
@@satoshinakamoto7253 You forgot to shut up and stop copy pasting the same comment everywhere.
@juancarlosvaleron48502 жыл бұрын
It's so funny. Digital is now so cumbersome I need to go back to my paper notebook to store all my data. Thank you digital revolution!
@awli8861 Жыл бұрын
I didn't watch the video but here are my tips: - Have multiple emails, - Redirect some of your request to TOR/proxychains with dnscrypt(most of TORs proxies does not encrypt the DNS so you can find someone just like in paper chase game)
@jamescarter54663 жыл бұрын
I've had a crap week, but you saying "visable" is just making me smile, this is why I love your content !
@nico13373 жыл бұрын
Why was Bitwarden not mentioned? Also just use the security questions fields for other passwords and save them somewhere else instead of answering them.
@RespectfullyCurious3 жыл бұрын
+1 for Bitwarden
@JohnSmith-gd2ws2 жыл бұрын
This video was full of flaws Putting a RPI in a random starbucks to protect your self from something that is false? What TF thats the whole reason of having 3 nodes on tor And nodes are still just proxies
@UGPVlogsLA2 жыл бұрын
@@JohnSmith-gd2ws That's exactly what I thought too
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@vlgado3895 Жыл бұрын
At point 17.01 you missed a golden opportunity for all the Tolkien fans. I was SO sure a few times you will say it: "but to disappear entirely, that is a rare gift". Very instructive video by the way. I especially liked the part about replacing a letter with a group of special characters. Very simple and useful.
@Vulcan_095 күн бұрын
Had me sold just from the opening
@derpo63962 жыл бұрын
Another way to save your password is saving it inside of an image on another device, this allows you to use a very complex password. While being pretty safe to use.
@VeronicaGorositoMusic3 ай бұрын
Steganography?
@boem2313 жыл бұрын
You could also use a VM and reset it (to a certain state) every time you're done using it
@Sebasivx3 жыл бұрын
what is a vm?
@boem2313 жыл бұрын
@@Sebasivx virtual machine
@juanitoefectivoo3 жыл бұрын
or use a virtual machine and sock5 in addition
@TengwarTeacher3 жыл бұрын
A vm by itself is no different than using your own machine though. It’s pointless.
@boem2313 жыл бұрын
@@TengwarTeacher it isn't. With a VM and you restore it to an earlier point, you ensure that no program stores anything on your machine
@mad_titanthanos3 жыл бұрын
The problem with tor is it's extremely slow
@gabbishlee51053 жыл бұрын
Here’s a hard question for you, if a company can provide end to end encryption for your IP address and packages.. how hard is it for one to just do it themselves?.. and would you consider making a video at least explaining the complexity of doing so? Thank you and bye ✌️
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@redrum4486 Жыл бұрын
yeah loads have these companies have extremely sensitive data and ever since working from home we all have vpns so there must be a simple way to just browse and do everything privately... however I guess when we use company laptops then we're less likely to do anything else other than work related activities on the laptop and so less likely to get hacked
@StudioChimps3 ай бұрын
All of the UK are watching this now! Level 3 for UK!!!!
@LiborTinka2 жыл бұрын
I used KeePass for a long time, then Dashlane and then I finally migrated to Linux, made an RSA key pair and stored all passwords with GnuPG. There is a useful "pass" script working on top of GPG. The passwords are simple binary files (encrypted) and can be easily transfered between machines or synced with Git. Of course, it's better not to show your files - then a LUKS-encrypted file system on your OS drive and thumb drives comes in handy. There is also a great password generator utilities like "apg" and "xkcdpass" that can make rememberable passwords for you that are strong against dictionary attacks. If you are really paranoid, there are privacy-oriented distributions like Tails.
@landanrainey70723 жыл бұрын
The longer videos are amazing! you’re such a good editor and great speaker
@kallehalldenassistant75783 жыл бұрын
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9}........,,,,,,,....
@satoshinakamoto72532 жыл бұрын
he forgot to mention the Tails OS and Prism laptops
@bringbackdislikes31952 жыл бұрын
@@satoshinakamoto7253 Nobody asked
@thiesemho3 жыл бұрын
To be invisible on the internet is impossible because you always have clues to know who you are, not even Tor can make anything to you, you can only disguise your identity
@dexterflodstrom99752 жыл бұрын
Great video as always! I'd like to add to the email part in that Simplemail can be used to create email aliases, which essentially allows you to create "new" emails that people can send mail to, but it will get forwarded to your actual email address, thus allowing you to in reality still only manage one email. Gmail has this built in as well I believe.
@theheinzification Жыл бұрын
No, Microsoft (outlook) has.
@moltopericoloso Жыл бұрын
Firefox has Firefox Relay now, user created "burner" email aliases that forward to an actual email address. You can one-time use aliases as and when required or keep some standard ones e.g. one for shopping, one for extortion, two for porn, etc. ;-)
@slax86792 жыл бұрын
great alternative to the whole password situation locked case + pen and paper
@v94662 жыл бұрын
Your information will never be fully removed
@ThatOneScienceGuy2 жыл бұрын
I like how he refers to the pandemic as the “thing that’s going on.”
@fakecrafter74483 жыл бұрын
Kalle using laptop with Intel Management engine telling us something about invisibility Still great video
@kallehalldenassistant75783 жыл бұрын
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,,.......,,,,,
@wongjowo91522 жыл бұрын
also talking about anonymity while using cloud service and mobile phone
@psychojan17153 жыл бұрын
One day i will be an outstanding programmer and i love your videos. A big fan of your videos.😍
@Hallden_3 жыл бұрын
Thank you I really appreciate it! And you will for sure
@kallehalldenassistant75783 жыл бұрын
Thank You For Watching And For More Feedback & Guidance Contact Via {W} {h} {a} {t} {s} {A} {p} {p} Directly = {+1} {9} {0} {9} {3} {1} {2 } {5} {0} {3} {9},,,,,,.....,,,,,
@paparazziphotography67127 ай бұрын
I thank U so much for this information & with that I'm pretty much a beginner to the information.but i'm really determined to give it a GO! Thank you for your time & information. Mr. Hop....
@VicentMcLachlan2 жыл бұрын
man, doing a research for my comic. now my brain is burning from all of that information.
@matteocassino31722 жыл бұрын
Unsurprisingly it ends up like Kevin Mitnick's: The Art of Invisibility. Well done! Hope to see more of this well presented content.
@ybsparky84842 жыл бұрын
Amazing video, very well put together. Keep it up :)
@yvsh3 жыл бұрын
Snowden: *takes notes
@collinloretitsch47312 жыл бұрын
Daammmnnn!!! Awesome video!!! This must be the dude behind the scenes running "silk road". Lol....seriously though. Great video
@blusun. Жыл бұрын
as a writer, i thank you for your work.
@khps91763 жыл бұрын
Everyone have already been connected on their private network that are registered in their name. It's already too late to become invissible for them.
@kmjgsdkmjgsd Жыл бұрын
As someone with a microscpic amount of online anonymity knowledge, but still practice things like temp mail, adblock extensions, not allowing location, etc, Ive always wondered less exactly if I could become more invisible online, and more how I can become invisible with my current existing profiles and circumstances. I can easily change passwords and browsers, but if I input my IRL data in Google or Apple for example, Im pretty sure there's nothing I can do to permanently clear my home address or gender. Also, Im not sure if I can switch all my accounts with separate emails, as right now all my recreational accounts have a single point of failure. Also, Im still kinda salty that I wasn't able to create more backup gmails when there was a free browser phone emulator that could be accessed with temporary emails. Hopefully I could find another workaround, but I don't even know if I can manage 10+ gmail accounts on a monthly basis.
@maxpro751 Жыл бұрын
Top hackers use millions of fake IP addresses to mask their real one so that anyone who tries to track them will have to work for days if not years to track them. That’s how you become fully anonymous 😎
@mattdouplesx Жыл бұрын
Proton mail
@tickledonions9483 Жыл бұрын
@@mattdouplesx ProtonMail logs your IP
@FREAKERKNOWS3 жыл бұрын
looks like this will help me a lot! THANKS, Kalle!
@Pianodaddyy2 жыл бұрын
Super excited to listen to this!
@mosab_faozi2 жыл бұрын
I came in here thinking this video was going to be like: "You can't. Thanks for watching.", but then I realized it is 24+ minutes long.
@hacklordmonster87802 жыл бұрын
I feel like if you can't afford a respberry pi you could just go to Starbucks
@Lunar_Official Жыл бұрын
It's a thing people tend to so actually like the creator of silkroad
@bensalkb69023 жыл бұрын
Me trying to be visible and get hired by someone
@youtubeuser60673 жыл бұрын
Major premise is incorrect for why you should do this. It is NOT the individual that is doing something illegal. It is a government/ state/ bad actor, etc that is engaging in illegal activity. This is why most individuals do need to do this. Think of communist/totalitarian states of old and the new ones rapidly emerging.
@iidotz53513 жыл бұрын
You said something and nothing at the same time
@blackphoenixfamily84773 жыл бұрын
@@iidotz5351 BWAHAHAHA, Indeed.....stealing this, hope you don't mind!
@blackphoenixfamily84773 жыл бұрын
It is NOT until he even gets to the described "3rd level of anonymity" that anything you just said could be loosely applied. If you have a burner cell, and or laptop, avoid family and friends as to not get filmed, so on....you prolly doin sumthin, lol.....allegedly
@Cardboardbox83 Жыл бұрын
I REALLY LOVE this video, explains everything I’ve really wanted to know and extra I didn’t even think about
@jnx4803 Жыл бұрын
Good passwords for those who don't have great memory is a string of 3 words separated by symbols (- + , . etc) The best is to increase numbers of words to 4. The whole thing with "oh it needs to be alphanumerical" is mostly BS, because string of words are as good, but easier to remember.
@niklasstefanseefeldt77773 жыл бұрын
Hi. I have a question when it comes to having multiple email addresses. Is it acceptable to have multiple aliases as email addresses? For example, Protonmail has this feature (in the paid version) where you can create multiple aliases which would act like having multiple email addresses. The question is, would it be a good idea? Thinking now, not directly, because those aliases are related to the main email address you have, so If someone would hack your email address he would get access to the aliases. So, in that case, would you recommend the use of aliases for having multiple email addresses? If not, for what would you use aliases?