Views : 59,631
Genre: Science & Technology
Date of upload: Apr 26, 2024 ^^
Rating : 4.892 (67/2,417 LTDR)
RYD date created : 2024-05-08T02:04:30.216141Z
See in json
Top Comments of this video!! :3
"Your VPN won't protect you" this is true for those who don't know how to use a VPN and how to seperate their own traffic. Browser isolation will probably not be enough either (if all your network traffic on that device is going through VPN tunnel), your identifiable traffic should NOT go through your VPN tunnel as that can then be associated with your 'anonymous' traffic, which essentially de-anonymises you - this is the main point of failure that newbies aren't aware of.
20 |
re tik-tok, I had understood the problem not to be that it's collecting data as stated here, but rather that what is collected is shared with the CPR gov't, and can be used to shape and manipulate the information environment of a sizeable portion of the US population. That's why they're not saying shut down Tik-Tok, they're saying sell it to a non-Chinese owned company.
3 |
Rob is correct on the privacy front and regarding the misuse of capability. If there is a computing/technological capability available to corporations or intelligence agencies, they will use it, and they will use it in such a way that user/device-owner rights to privacy and, indeed, ownership rights, will be harmed. In hacker terminology, these people want to sell you devices and software and to own those things at the same time. Preferably, they will be able to extract a subscription fee for the privilege of being owned and having your personal data stolen and sold on the open market.
Our governments encourage this, to give intelligence agencies and law enforcement the "tools" they need. Never mind that these agencies have long had far more access to data than they need. In exchange for stripping citizens of constitutional rights, tech-illiterate politicians have long given tech companies a blanket regulatory pass on their rapacious surveillance practices. So long, that is, as the key agencies get their "tools" - complete with GUIs for desk jockeys who do not actually hack anything themselves.
We need to be aware of all this stuff, in the first instance for our own dignity, but beyond that to change the political culture that has allowed this stuff to go as far as it has gone.
5 |
@davidbombal
1 week ago
Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: brilliant.org/DavidBombal The machines are already tracking and watching you. And they're influencing you. The future looks bleak. Do you really want to live in a Skynet world? I interview Rob Braxman - the Internet Privacy Guy. He's a public interest hacker and technologist. He uses his extensive knowledge of cybersecurity and tech to serve the public good. He cares about privacy. He warns you of digital manipulation, disinformation, mass surveillance. // Rob Braxmanâs SOCIAL// YouTube: youtube.com/@robbraxmantech Website: brax.me/home/rob GitHub: github.com/robbraxman X: x.com/robbraxmantech // Specific Video REFERENCE // Is Skynet already watching you?: https://youtu.be/To5Nbs6DmIA Neuralink a Weapon?: https://youtu.be/1SMbvhXI6wk AI will deliver Utopia they say! Will it be an amazing world!? (Tongue in Cheek): https://youtu.be/kJ3mkQ4wFdk Signet 2024: Infrastructure is Complete!: https://youtu.be/9xPjIfJI5Jk // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com/ // MENU // 00:00 - Coming Up 00:50 - Brilliant (Sponsored Section) 01:55 - Intro to Rob Braxman 03:31 - Explaining "Mesh Networks" 05:14 - The Internet Privacy Guy 06:30 - Apple Encryption Scanning 08:41 - Client Side Scanning 09:34 - The Evolution of AI 11:27 - TikTok Collecting Data 13:57 - Explaining the Predictions 16:20 - Client Side Scanning Laws 18:49 - Opinions on Neuralink 21:20 - What Feeds the AI? 22:25 - Google is the biggest threat? 26:45 - The Cookie Problem 28:12 - Social Platform Cookies 29:38 - Navigating Google Sites 30:23 - Cross Device Tracking 35:09 - Sending Data to The NLP 35:57 - Moving Away From Cellphones 38:24 - How to Navigate Computers 40:30 - Cellphone Software Suggestions 42:12 - Downloading Apps 44:51 - Receiving Notifications 46:09 - App Limitations 49:18 - VPNs & Search Engines 51:59 - The Threat Model 53:23 - Search Engine Recommendations 55:16 - Information on Jigsaw 57:36 - How to be Private Online 01:00:32 - Pseudo anonymity 01:02:09 - Rob's Last Words apple google degoogle phone degoogling a phone ios skynet robocop pine phone privacy online privacy online privacy guide internet security tracking online privacy for kids online privacy and security online privacy it doesnt exist online privacy tips online privacy ted talk online privacy guide online privacy for students internet security tutorial edward snowden naomi brockwell privacy five eyes 5 eyes brave browser tor protonvpn protonmail duckduckgo google online tracking ios android graphite phone privacy browser privacy browser ios privacy broke privacy browser for pc anonymous hide online hidden identity hide identity online data hack identity internet privacy social change technology Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #privacy #anonymous #hack
16 |