Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,000 --> 00:00:01,800
as a matter of fact you know being in
2
00:00:01,800 --> 00:00:04,020
the U.S makes it uh somewhat more
3
00:00:04,020 --> 00:00:07,080
challenging to be too anonymous because
4
00:00:07,080 --> 00:00:10,920
we have the NSA who has uh who has their
5
00:00:10,920 --> 00:00:15,719
fingers into every transaction so all
6
00:00:15,719 --> 00:00:17,699
you NSA people out there who are
7
00:00:17,699 --> 00:00:20,100
watching this video we know we know we
8
00:00:20,100 --> 00:00:22,199
know what you're doing and
9
00:00:22,199 --> 00:00:23,939
um so that was episode one that's an
10
00:00:23,939 --> 00:00:26,279
important lesson Elliot says whoever
11
00:00:26,279 --> 00:00:30,060
controls the final hop on the network
12
00:00:30,060 --> 00:00:32,579
controls the traffic the onion reading
13
00:00:32,579 --> 00:00:34,320
protocol it's not as Anonymous as you
14
00:00:34,320 --> 00:00:36,780
think it is whoever's in control of the
15
00:00:36,780 --> 00:00:38,880
exit nodes is also in control of the
16
00:00:38,880 --> 00:00:41,640
traffic which makes me
17
00:00:41,640 --> 00:00:44,219
the one in control and that's the same
18
00:00:44,219 --> 00:00:47,100
thing that the NSA knows is that they
19
00:00:47,100 --> 00:00:49,020
know whoever controls the final hop
20
00:00:49,020 --> 00:00:52,079
controls the network
21
00:00:52,079 --> 00:00:54,300
you know from my experience of dealing
22
00:00:54,300 --> 00:00:55,800
with all of these these young people
23
00:00:55,800 --> 00:00:58,379
that's that's like their ultimate goal
24
00:00:58,379 --> 00:01:00,360
is to be able to hack their neighbor's
25
00:01:00,360 --> 00:01:03,420
Wi-Fi yeah that that's that's why they
26
00:01:03,420 --> 00:01:05,159
all want those Wi-Fi they want to get
27
00:01:05,159 --> 00:01:06,720
the white they want to get the Wi-Fi of
28
00:01:06,720 --> 00:01:08,460
the neighbors and they think also that
29
00:01:08,460 --> 00:01:10,439
maybe we should throw this in here is
30
00:01:10,439 --> 00:01:13,080
that they think that if they use the
31
00:01:13,080 --> 00:01:15,479
neighbor's IP address that they're safe
32
00:01:15,479 --> 00:01:17,520
so joking aside because obviously we
33
00:01:17,520 --> 00:01:19,500
don't recommend that would using your
34
00:01:19,500 --> 00:01:21,240
neighbor's Wi-Fi actually keep you safe
35
00:01:21,240 --> 00:01:23,520
you know a lot of people believe that if
36
00:01:23,520 --> 00:01:25,200
they use their neighbor's Wi-Fi that
37
00:01:25,200 --> 00:01:27,060
they're going to be safe because the IP
38
00:01:27,060 --> 00:01:29,340
address is going to be show that the
39
00:01:29,340 --> 00:01:31,740
neighbor was on that website many years
40
00:01:31,740 --> 00:01:35,460
ago I was working with an investigator
41
00:01:35,460 --> 00:01:37,799
for I think it was with the Navy at the
42
00:01:37,799 --> 00:01:39,840
time he was uh what they call the naval
43
00:01:39,840 --> 00:01:42,420
criminal investigation unit and he and I
44
00:01:42,420 --> 00:01:44,460
were talking he said to me that doesn't
45
00:01:44,460 --> 00:01:46,979
work and I said why not he says because
46
00:01:46,979 --> 00:01:49,799
whenever there's a crime committed the
47
00:01:49,799 --> 00:01:53,340
first it is clear that the people whose
48
00:01:53,340 --> 00:01:55,920
whole Wi-Fi did not commit the crime the
49
00:01:55,920 --> 00:01:57,659
first thing we do is we start knocking
50
00:01:57,659 --> 00:02:00,479
on the doors of everybody within a few
51
00:02:00,479 --> 00:02:03,060
houses and a hundred percent of the time
52
00:02:03,060 --> 00:02:04,740
a hundred percent that is what he said
53
00:02:04,740 --> 00:02:06,540
I'm not saying this he said he said a
54
00:02:06,540 --> 00:02:08,759
hundred percent of the time we will find
55
00:02:08,759 --> 00:02:10,380
the person who committed the crime
56
00:02:10,380 --> 00:02:13,860
within a few houses all right so he says
57
00:02:13,860 --> 00:02:16,080
I said 100 of the time it was yes a
58
00:02:16,080 --> 00:02:17,700
hundred percent of the time even though
59
00:02:17,700 --> 00:02:19,980
it's possible to be able to pick up
60
00:02:19,980 --> 00:02:22,620
Wi-Fi in some circumstances with special
61
00:02:22,620 --> 00:02:25,140
yagi antennas and what have you you can
62
00:02:25,140 --> 00:02:28,379
pick up Wi-Fi for or two right but
63
00:02:28,379 --> 00:02:31,020
hackers because they're people who think
64
00:02:31,020 --> 00:02:32,640
that they can get away with a crime by
65
00:02:32,640 --> 00:02:35,160
using their neighbors they almost always
66
00:02:35,160 --> 00:02:38,459
get caught because they are using the
67
00:02:38,459 --> 00:02:41,160
next door neighbors or the person two or
68
00:02:41,160 --> 00:02:43,440
three houses down and then law
69
00:02:43,440 --> 00:02:45,300
enforcement just has to go knocking on
70
00:02:45,300 --> 00:02:47,459
doors and asking questions I was
71
00:02:47,459 --> 00:02:49,080
surprised when he told me that he said
72
00:02:49,080 --> 00:02:51,300
100 of the time and so since that this
73
00:02:51,300 --> 00:02:53,280
is over 10 years yeah I've I've kind of
74
00:02:53,280 --> 00:02:55,860
checked the cases and he's right 100 of
75
00:02:55,860 --> 00:02:58,440
the time the person is is right next
76
00:02:58,440 --> 00:03:01,019
door or right behind the house or in the
77
00:03:01,019 --> 00:03:02,519
same apartment building hey everyone
78
00:03:02,519 --> 00:03:04,200
it's David Bumble back with occupy the
79
00:03:04,200 --> 00:03:05,879
web it's been too long since our last
80
00:03:05,879 --> 00:03:07,739
interview so glad to have him back okay
81
00:03:07,739 --> 00:03:09,720
by the web welcome thanks David it's
82
00:03:09,720 --> 00:03:13,080
always good to be back on the best I.T
83
00:03:13,080 --> 00:03:16,140
cyber security Channel on YouTube that's
84
00:03:16,140 --> 00:03:17,640
very kind of you to say that if you
85
00:03:17,640 --> 00:03:19,019
don't know who occupy the web is have a
86
00:03:19,019 --> 00:03:20,099
look at our previous videos which I've
87
00:03:20,099 --> 00:03:22,019
linked below he's also the author of
88
00:03:22,019 --> 00:03:23,760
this book Linux basics for hackers
89
00:03:23,760 --> 00:03:24,900
fantastic book if you want to learn
90
00:03:24,900 --> 00:03:26,940
Linux from a hacker's point of view he's
91
00:03:26,940 --> 00:03:28,560
also recently published this book
92
00:03:28,560 --> 00:03:31,140
Network basics for hackers what I love
93
00:03:31,140 --> 00:03:33,840
about his books is he takes subjects
94
00:03:33,840 --> 00:03:37,500
like networking Wi-Fi whichever subject
95
00:03:37,500 --> 00:03:39,300
you're interested in like Linux and he
96
00:03:39,300 --> 00:03:40,980
teaches it from a hacker's point of view
97
00:03:40,980 --> 00:03:42,959
he's also got this book getting started
98
00:03:42,959 --> 00:03:44,700
becoming a master hacker really great to
99
00:03:44,700 --> 00:03:46,680
have you back occupy the web what are we
100
00:03:46,680 --> 00:03:48,480
talking about today because this is a
101
00:03:48,480 --> 00:03:50,340
really good topic I think well today's
102
00:03:50,340 --> 00:03:53,280
topic is how to remain anonymous on the
103
00:03:53,280 --> 00:03:55,799
internet this is a subject matter that
104
00:03:55,799 --> 00:03:58,200
is near and dear to my heart I've just
105
00:03:58,200 --> 00:03:59,580
got to interrupt you before because I
106
00:03:59,580 --> 00:04:01,500
want to say this for everyone who asks
107
00:04:01,500 --> 00:04:03,959
because I get this a lot I don't know
108
00:04:03,959 --> 00:04:06,000
who occupy the web actually is because
109
00:04:06,000 --> 00:04:07,440
you're anonymous to me as well I don't
110
00:04:07,440 --> 00:04:08,519
know your name I don't know where you
111
00:04:08,519 --> 00:04:10,200
live I kind of believe that you live in
112
00:04:10,200 --> 00:04:11,040
the US
113
00:04:11,040 --> 00:04:12,720
um but I know almost nothing about you
114
00:04:12,720 --> 00:04:13,980
so you've done a really good job of
115
00:04:13,980 --> 00:04:15,239
being anonymous so I think you're the
116
00:04:15,239 --> 00:04:16,739
right person to talk about this ah
117
00:04:16,739 --> 00:04:19,560
thanks uh yeah I am in the US so we can
118
00:04:19,560 --> 00:04:23,040
you can tell my American accent I'm in
119
00:04:23,040 --> 00:04:24,840
the U.S as a matter of fact you know
120
00:04:24,840 --> 00:04:27,180
being in the US makes it uh somewhat
121
00:04:27,180 --> 00:04:30,000
more challenging to be uh to anonymous
122
00:04:30,000 --> 00:04:33,660
because we have the NSA who has uh who
123
00:04:33,660 --> 00:04:38,040
has their fingers into every transaction
124
00:04:38,040 --> 00:04:41,220
every packet that traverses the internet
125
00:04:41,220 --> 00:04:43,139
through the US they don't necessarily
126
00:04:43,139 --> 00:04:45,360
have that around the world they try to
127
00:04:45,360 --> 00:04:47,340
have that around the world but they
128
00:04:47,340 --> 00:04:49,800
definitely have it in the US so all you
129
00:04:49,800 --> 00:04:51,900
NSA people out there who are watching
130
00:04:51,900 --> 00:04:54,360
this video we know we know we know what
131
00:04:54,360 --> 00:04:56,460
you're doing and we know that you're
132
00:04:56,460 --> 00:04:58,620
looking at every packet and they know
133
00:04:58,620 --> 00:05:01,440
exactly who everybody is and the NSA
134
00:05:01,440 --> 00:05:03,720
folks they have made it really clear to
135
00:05:03,720 --> 00:05:06,000
me that they know who I am they have
136
00:05:06,000 --> 00:05:07,680
actually you know they accept me
137
00:05:07,680 --> 00:05:10,199
messages saying we know who you are and
138
00:05:10,199 --> 00:05:13,520
they do that on purpose because the NSA
139
00:05:13,520 --> 00:05:17,040
they kind of see the internet as their
140
00:05:17,040 --> 00:05:19,080
territory and they want to know
141
00:05:19,080 --> 00:05:21,180
everybody who's in their territory so
142
00:05:21,180 --> 00:05:24,780
trying to stay Anonymous from the NSA
143
00:05:24,780 --> 00:05:27,120
is really really hard if you're in the
144
00:05:27,120 --> 00:05:28,919
U.S it's not as hard in your other
145
00:05:28,919 --> 00:05:30,539
countries but in the U.S it's really
146
00:05:30,539 --> 00:05:32,699
hard because they basically have Taps
147
00:05:32,699 --> 00:05:35,699
into all the pipelines of all the
148
00:05:35,699 --> 00:05:37,800
traffic in the U.S and they capture
149
00:05:37,800 --> 00:05:40,800
every packet and can examine it if they
150
00:05:40,800 --> 00:05:43,560
want to know who you are and they can
151
00:05:43,560 --> 00:05:46,139
find out so but if you're in other
152
00:05:46,139 --> 00:05:48,180
countries it's a little bit easier to
153
00:05:48,180 --> 00:05:51,000
stay Anonymous from the NSA and the
154
00:05:51,000 --> 00:05:53,340
other intelligence agencies but it's
155
00:05:53,340 --> 00:05:55,919
really hard to stay Anonymous from your
156
00:05:55,919 --> 00:05:58,800
own countries intelligence agencies
157
00:05:58,800 --> 00:06:02,100
because all of them have Taps into the
158
00:06:02,100 --> 00:06:04,680
local internet so let's let's say this
159
00:06:04,680 --> 00:06:07,259
right up front Okay that is really hard
160
00:06:07,259 --> 00:06:09,539
to stay Anonymous from your own
161
00:06:09,539 --> 00:06:12,360
countries intelligence agencies I also
162
00:06:12,360 --> 00:06:16,020
want to point out that if you become a
163
00:06:16,020 --> 00:06:18,240
target from these intelligence agencies
164
00:06:18,240 --> 00:06:21,300
it's really really hard to remain
165
00:06:21,300 --> 00:06:24,180
anonymous because they have tools that
166
00:06:24,180 --> 00:06:26,340
make it really really difficult to stay
167
00:06:26,340 --> 00:06:29,160
Anonymous uh David you and I are going
168
00:06:29,160 --> 00:06:33,720
to do a show on Pegasus yeah Pegasus is
169
00:06:33,720 --> 00:06:36,300
this notorious cell phone hacking
170
00:06:36,300 --> 00:06:41,460
software put out by NOS I mean NSO the
171
00:06:41,460 --> 00:06:44,639
um Israeli hacking group and with NS
172
00:06:44,639 --> 00:06:46,440
with Pegasus they can basically just
173
00:06:46,440 --> 00:06:49,020
Target your phone and take over your
174
00:06:49,020 --> 00:06:50,940
phone and then of course you're not
175
00:06:50,940 --> 00:06:52,979
Anonymous every message that you send on
176
00:06:52,979 --> 00:06:55,319
your phone all your geolocation Services
177
00:06:55,319 --> 00:06:58,620
every message you send becomes captured
178
00:06:58,620 --> 00:07:00,960
by the intelligence agency so that's a
179
00:07:00,960 --> 00:07:03,360
whole different bailiwick of trying to
180
00:07:03,360 --> 00:07:05,280
remain anonymous from those guys because
181
00:07:05,280 --> 00:07:08,419
they have capabilities and they have
182
00:07:08,419 --> 00:07:11,819
legal sanction to do things that nobody
183
00:07:11,819 --> 00:07:13,380
else does if you're talking offline
184
00:07:13,380 --> 00:07:14,699
there's different levels right so you've
185
00:07:14,699 --> 00:07:16,020
got like the commercial companies is
186
00:07:16,020 --> 00:07:17,759
that right and then it like the NSA is
187
00:07:17,759 --> 00:07:20,400
like right at the extreme NSA is the
188
00:07:20,400 --> 00:07:22,199
extreme in the United States because
189
00:07:22,199 --> 00:07:25,500
literally they're given access to to all
190
00:07:25,500 --> 00:07:27,479
the pipes and they can see all the
191
00:07:27,479 --> 00:07:29,880
traffic and they can trace but they
192
00:07:29,880 --> 00:07:31,500
don't have that necessary that access in
193
00:07:31,500 --> 00:07:33,000
other countries some countries they do
194
00:07:33,000 --> 00:07:35,639
but in U.S they've been given Total
195
00:07:35,639 --> 00:07:38,039
Access to all the pipes and so they they
196
00:07:38,039 --> 00:07:40,319
collect all of the data they have this
197
00:07:40,319 --> 00:07:42,780
big data Farm where they put all the
198
00:07:42,780 --> 00:07:44,759
data in there and they can basically
199
00:07:44,759 --> 00:07:47,699
Trace just about they can trace anybody
200
00:07:47,699 --> 00:07:50,580
and they get metadata off all of the
201
00:07:50,580 --> 00:07:53,160
packets and all the traffic if they if
202
00:07:53,160 --> 00:07:55,560
you become a Target then they can do
203
00:07:55,560 --> 00:07:57,960
even more and get more information about
204
00:07:57,960 --> 00:07:59,699
you so I mean some people might be
205
00:07:59,699 --> 00:08:00,780
disappointed about what you said because
206
00:08:00,780 --> 00:08:02,460
it's like how do I stay invisible how do
207
00:08:02,460 --> 00:08:04,919
I stay you know Anonymous is can I stay
208
00:08:04,919 --> 00:08:06,300
Anonymous from Google can I stay
209
00:08:06,300 --> 00:08:09,479
Anonymous from from anyone or as soon as
210
00:08:09,479 --> 00:08:10,680
I go on the internet I'm not going to be
211
00:08:10,680 --> 00:08:12,539
discovered well if you're trying to stay
212
00:08:12,539 --> 00:08:14,639
Anonymous from the commercial interest
213
00:08:14,639 --> 00:08:16,620
that's relatively easy and we can talk
214
00:08:16,620 --> 00:08:18,660
about that the other thing that I find
215
00:08:18,660 --> 00:08:20,819
with a lot of people is that they
216
00:08:20,819 --> 00:08:24,120
believe that the only way to trace them
217
00:08:24,120 --> 00:08:26,099
is through through their IP address so
218
00:08:26,099 --> 00:08:29,340
this is fixation on on being able to
219
00:08:29,340 --> 00:08:31,740
hide their IP address there's other ways
220
00:08:31,740 --> 00:08:34,140
of tracing your identity other than your
221
00:08:34,140 --> 00:08:36,000
IP address so if all you're focused on
222
00:08:36,000 --> 00:08:37,919
is hiding your IP address you're going
223
00:08:37,919 --> 00:08:40,260
to be exposed by both the commercial
224
00:08:40,260 --> 00:08:43,919
interests and you know the the law
225
00:08:43,919 --> 00:08:46,140
enforcement and intelligence agencies so
226
00:08:46,140 --> 00:08:49,080
you have to think about all of the
227
00:08:49,080 --> 00:08:51,779
different ways that somebody can trace
228
00:08:51,779 --> 00:08:53,519
you and that's why one of the things
229
00:08:53,519 --> 00:08:56,100
that I emphasize is that if you want to
230
00:08:56,100 --> 00:08:59,100
remain anonymous and safe you need to
231
00:08:59,100 --> 00:09:01,680
understand forensics you need to
232
00:09:01,680 --> 00:09:05,279
understand OSN so if you understand both
233
00:09:05,279 --> 00:09:08,100
of those fields and you understand then
234
00:09:08,100 --> 00:09:11,880
what people can do to find you and find
235
00:09:11,880 --> 00:09:14,399
your information then the better off you
236
00:09:14,399 --> 00:09:18,300
are in being able to hide your identity
237
00:09:18,300 --> 00:09:20,700
and your traffic are you saying that
238
00:09:20,700 --> 00:09:23,700
that vpns are like all these VPN adverts
239
00:09:23,700 --> 00:09:25,380
are wrong you know if I get a VPN I'm
240
00:09:25,380 --> 00:09:27,560
safe
241
00:09:27,920 --> 00:09:32,640
let's start off by saying one okay that
242
00:09:32,640 --> 00:09:35,640
you're only as safe as the VPN is safe
243
00:09:35,640 --> 00:09:38,580
right so the VPN is going to hide your
244
00:09:38,580 --> 00:09:40,860
IP address right that's what I was my
245
00:09:40,860 --> 00:09:42,360
point I was trying to make earlier is
246
00:09:42,360 --> 00:09:44,399
that there's obsession with the IP
247
00:09:44,399 --> 00:09:45,839
address but the whole business has been
248
00:09:45,839 --> 00:09:47,459
built on this whole industry so I'm just
249
00:09:47,459 --> 00:09:49,260
I'm just being sarcastic yeah and we're
250
00:09:49,260 --> 00:09:51,180
gonna blow it apart right because yes
251
00:09:51,180 --> 00:09:53,279
it's a it's a good it's a good measure
252
00:09:53,279 --> 00:09:55,440
vpns are a good measure proxies are good
253
00:09:55,440 --> 00:09:58,260
measures Tor are good measures but there
254
00:09:58,260 --> 00:10:01,500
are ways of tracing you other than just
255
00:10:01,500 --> 00:10:05,100
the IP all of those okay are going to
256
00:10:05,100 --> 00:10:07,860
hide your IP address but there's other
257
00:10:07,860 --> 00:10:10,200
ways of tracing you other than just your
258
00:10:10,200 --> 00:10:12,240
IP address one of the things you have to
259
00:10:12,240 --> 00:10:13,680
keep in mind when trying to remain
260
00:10:13,680 --> 00:10:16,740
anonymous is that you you can only put
261
00:10:16,740 --> 00:10:19,080
up you know you can put up hurdles all
262
00:10:19,080 --> 00:10:21,360
right but it's almost impossible if an
263
00:10:21,360 --> 00:10:23,100
intelligence agency wants to find you
264
00:10:23,100 --> 00:10:26,580
that they do if law enforcement is going
265
00:10:26,580 --> 00:10:29,459
to try to find you they have resources
266
00:10:29,459 --> 00:10:31,920
but they have to spend a lot of
267
00:10:31,920 --> 00:10:33,779
resources if you're good they have to
268
00:10:33,779 --> 00:10:35,880
spend a lot of resources to find you now
269
00:10:35,880 --> 00:10:38,580
in general you know most people who are
270
00:10:38,580 --> 00:10:41,279
navigating the internet are not thinking
271
00:10:41,279 --> 00:10:44,160
about anonymity and basically they're
272
00:10:44,160 --> 00:10:46,200
giving away all of their information
273
00:10:46,200 --> 00:10:48,839
about their entire life to commercial
274
00:10:48,839 --> 00:10:52,740
interests like Facebook or Google and
275
00:10:52,740 --> 00:10:54,660
others I don't know I'm not comfortable
276
00:10:54,660 --> 00:10:58,500
with that maybe you are but yeah and so
277
00:10:58,500 --> 00:11:00,060
one of the things you have to keep in
278
00:11:00,060 --> 00:11:02,640
mind is that if you're using Chrome
279
00:11:02,640 --> 00:11:04,860
which is a great browser by the way
280
00:11:04,860 --> 00:11:06,480
Google Google makes a really good
281
00:11:06,480 --> 00:11:09,300
browser and I really love Chrome but
282
00:11:09,300 --> 00:11:12,899
it's constantly sending back all your
283
00:11:12,899 --> 00:11:15,060
personal information back to Google
284
00:11:15,060 --> 00:11:18,180
Headquarters if you if you ever using
285
00:11:18,180 --> 00:11:20,760
Chrome open up say Wireshark while
286
00:11:20,760 --> 00:11:22,620
you're using Chrome and what you'll see
287
00:11:22,620 --> 00:11:24,240
when you're using Wireshark is that
288
00:11:24,240 --> 00:11:27,420
Chrome home is constantly communicating
289
00:11:27,420 --> 00:11:29,519
back to Google Headquarters everything
290
00:11:29,519 --> 00:11:32,220
that you're doing they're constantly
291
00:11:32,220 --> 00:11:34,680
sending back information on you so when
292
00:11:34,680 --> 00:11:37,500
you get an ad then you go cash that's
293
00:11:37,500 --> 00:11:39,540
amazing I was just thinking about buying
294
00:11:39,540 --> 00:11:41,339
that how did that pop up on my screen
295
00:11:41,339 --> 00:11:44,459
well that's no mystery because you know
296
00:11:44,459 --> 00:11:46,680
they not only are they sending back
297
00:11:46,680 --> 00:11:49,260
information about you but remember we're
298
00:11:49,260 --> 00:11:51,540
living in the era of artificial
299
00:11:51,540 --> 00:11:54,240
intelligence and artificial intelligence
300
00:11:54,240 --> 00:11:57,660
is not only looking at what you're
301
00:11:57,660 --> 00:11:59,760
searching for but they're trying to
302
00:11:59,760 --> 00:12:02,700
create a mind map of you so what they're
303
00:12:02,700 --> 00:12:04,440
doing is that they're saying the person
304
00:12:04,440 --> 00:12:07,680
who is doing these types of searches is
305
00:12:07,680 --> 00:12:09,660
likely the next thing they're going to
306
00:12:09,660 --> 00:12:12,300
want is this because that's the pattern
307
00:12:12,300 --> 00:12:14,700
that we understand from looking at
308
00:12:14,700 --> 00:12:17,940
billions of people in the world that
309
00:12:17,940 --> 00:12:19,920
with these characteristics they're going
310
00:12:19,920 --> 00:12:22,760
to want this and they can actually
311
00:12:22,760 --> 00:12:25,920
anticipate your need leads and send you
312
00:12:25,920 --> 00:12:28,560
an ad for it so if you want to stay
313
00:12:28,560 --> 00:12:31,440
Anonymous from those people that's a
314
00:12:31,440 --> 00:12:33,300
little bit easier to do now one of the
315
00:12:33,300 --> 00:12:34,980
things is first off just don't use
316
00:12:34,980 --> 00:12:36,380
Google Chrome
317
00:12:36,380 --> 00:12:39,779
because Google Chrome is is owned by
318
00:12:39,779 --> 00:12:42,480
Google right and it's communicating Bing
319
00:12:42,480 --> 00:12:45,240
is communicating to Microsoft even
320
00:12:45,240 --> 00:12:48,360
Mozilla is communicating back it's most
321
00:12:48,360 --> 00:12:50,339
of those a little safer than the others
322
00:12:50,339 --> 00:12:52,320
but still you know they're they're
323
00:12:52,320 --> 00:12:54,360
communicating back what you're searching
324
00:12:54,360 --> 00:12:57,360
for on the web there's a relatively new
325
00:12:57,360 --> 00:13:01,380
browser called Brave right that um yeah
326
00:13:01,380 --> 00:13:05,760
you use it I use it that is a is more
327
00:13:05,760 --> 00:13:08,279
Anonymous than the others so that's one
328
00:13:08,279 --> 00:13:10,320
of my first recommendations is get away
329
00:13:10,320 --> 00:13:13,320
from using Chrome and Bing and when you
330
00:13:13,320 --> 00:13:15,240
say you mean you mean one of the new
331
00:13:15,240 --> 00:13:18,720
browsers Edge right Edge I'm sorry being
332
00:13:18,720 --> 00:13:20,639
the search engine yeah Bing is their
333
00:13:20,639 --> 00:13:23,220
search engine edges so yeah those those
334
00:13:23,220 --> 00:13:26,579
products are designed to capture
335
00:13:26,579 --> 00:13:29,040
information about you and then once
336
00:13:29,040 --> 00:13:30,959
somebody captures information about you
337
00:13:30,959 --> 00:13:34,139
it's pretty easy for them to be able to
338
00:13:34,139 --> 00:13:36,300
to determine who you are there's other
339
00:13:36,300 --> 00:13:38,880
things that can also be captured like
340
00:13:38,880 --> 00:13:41,160
for instance there's a whenever you
341
00:13:41,160 --> 00:13:43,639
visit a website you know you're
342
00:13:43,639 --> 00:13:47,040
presenting these cookies that are in
343
00:13:47,040 --> 00:13:48,959
your browser right so if there's any
344
00:13:48,959 --> 00:13:51,480
cookies in your browser they are going
345
00:13:51,480 --> 00:13:54,959
to appear and that cookie is has
346
00:13:54,959 --> 00:13:57,540
identifying information at least if it's
347
00:13:57,540 --> 00:14:00,600
a cookie that has been placed there by
348
00:14:00,600 --> 00:14:03,660
Google or Facebook okay and those both
349
00:14:03,660 --> 00:14:05,279
those companies put cookies in your
350
00:14:05,279 --> 00:14:08,339
browser then it's going to identify who
351
00:14:08,339 --> 00:14:10,079
you are all right so one of the things
352
00:14:10,079 --> 00:14:13,019
you can do with your browser is go to
353
00:14:13,019 --> 00:14:15,420
the settings and turn off no cookies now
354
00:14:15,420 --> 00:14:18,000
that's going to make your life a little
355
00:14:18,000 --> 00:14:20,160
bit less convenient because that means
356
00:14:20,160 --> 00:14:21,779
you're going to have to log into every
357
00:14:21,779 --> 00:14:23,639
website and nobody's going to know who
358
00:14:23,639 --> 00:14:25,440
you are when you go when you log into
359
00:14:25,440 --> 00:14:27,000
your Facebook account they're not going
360
00:14:27,000 --> 00:14:28,440
to automatically know who you are and
361
00:14:28,440 --> 00:14:31,620
log you in or other services so it makes
362
00:14:31,620 --> 00:14:33,839
life a little more difficult but it's
363
00:14:33,839 --> 00:14:36,000
going to save your identity you would
364
00:14:36,000 --> 00:14:37,740
use like recommend using private browser
365
00:14:37,740 --> 00:14:39,240
windows stuff like that right private
366
00:14:39,240 --> 00:14:41,760
browser windows and just turning off the
367
00:14:41,760 --> 00:14:45,000
no cookings okay on any browser that you
368
00:14:45,000 --> 00:14:46,320
use it's going to come in different
369
00:14:46,320 --> 00:14:47,699
places it's usually going to be in
370
00:14:47,699 --> 00:14:49,980
settings security and you can go ahead
371
00:14:49,980 --> 00:14:53,220
and and click on no cookies cookies are
372
00:14:53,220 --> 00:14:55,680
a lot of information for those who
373
00:14:55,680 --> 00:14:57,120
aren't familiar with cookies cookies
374
00:14:57,120 --> 00:15:00,120
basically a text file that has
375
00:15:00,120 --> 00:15:02,519
information about who you are and what
376
00:15:02,519 --> 00:15:04,199
your interests are it may actually
377
00:15:04,199 --> 00:15:05,699
include
378
00:15:05,699 --> 00:15:08,940
um things like uh your your username and
379
00:15:08,940 --> 00:15:12,240
password this is it as you Traverse the
380
00:15:12,240 --> 00:15:14,760
internet these cookies can be presented
381
00:15:14,760 --> 00:15:18,180
to other people other websites so people
382
00:15:18,180 --> 00:15:21,300
are focused on IP addresses but remember
383
00:15:21,300 --> 00:15:24,060
for somebody to identify You by IP
384
00:15:24,060 --> 00:15:25,620
address us they actually would have to
385
00:15:25,620 --> 00:15:29,160
get into the ISP or the VPN to get their
386
00:15:29,160 --> 00:15:31,320
records their log files to identify you
387
00:15:31,320 --> 00:15:33,120
IP addresses are something to be
388
00:15:33,120 --> 00:15:35,220
concerned about but these other issues
389
00:15:35,220 --> 00:15:38,459
are equally important in terms of trying
390
00:15:38,459 --> 00:15:40,920
to maintain your anonymity on the
391
00:15:40,920 --> 00:15:42,959
internet one of the things that I'd like
392
00:15:42,959 --> 00:15:46,500
to show you here let's go into Kali and
393
00:15:46,500 --> 00:15:49,139
talking about IP addresses one of the
394
00:15:49,139 --> 00:15:51,360
things that is available to us in Cali
395
00:15:51,360 --> 00:15:53,399
and other places is what's called proxy
396
00:15:53,399 --> 00:15:57,300
chains so proxy chains is a tool that
397
00:15:57,300 --> 00:16:00,000
uses multiple you can use a single proxy
398
00:16:00,000 --> 00:16:03,660
or multiple proxies okay to be able to
399
00:16:03,660 --> 00:16:05,820
hide your IP address so let's go just
400
00:16:05,820 --> 00:16:07,680
hiding your IP address we're going ahead
401
00:16:07,680 --> 00:16:09,779
let's open up a terminal in I've got
402
00:16:09,779 --> 00:16:11,279
some let's open up a new one here
403
00:16:11,279 --> 00:16:14,399
there's a tool in Cali that allows you
404
00:16:14,399 --> 00:16:17,220
to use proxies it's called proxy genes
405
00:16:17,220 --> 00:16:19,980
so you can just go proxy changes built
406
00:16:19,980 --> 00:16:21,300
into
407
00:16:21,300 --> 00:16:24,779
um Cali and others not just not just uh
408
00:16:24,779 --> 00:16:27,300
Cali but now there's parrot and Arch
409
00:16:27,300 --> 00:16:29,279
Linux and a number of others have proxy
410
00:16:29,279 --> 00:16:31,260
chains built into it as well the key to
411
00:16:31,260 --> 00:16:33,899
using proxy chains is simply to set up
412
00:16:33,899 --> 00:16:36,720
the configuration file in Linux you know
413
00:16:36,720 --> 00:16:38,579
every configuration file is simply a
414
00:16:38,579 --> 00:16:40,500
text file all you have to do is go into
415
00:16:40,500 --> 00:16:42,899
the text file to be able to edit it so
416
00:16:42,899 --> 00:16:45,480
let's go and look at the proxy chains
417
00:16:45,480 --> 00:16:47,880
configuration file let's see it's I'm
418
00:16:47,880 --> 00:16:49,500
going to use that I
419
00:16:49,500 --> 00:16:52,440
mouse pad which is built into Cali it's
420
00:16:52,440 --> 00:16:55,199
a GUI bass person's Bim and we're gonna
421
00:16:55,199 --> 00:16:58,740
go is that Etsy proxy but I remember
422
00:16:58,740 --> 00:17:00,680
where is that
423
00:17:00,680 --> 00:17:03,860
proxychains.com nope it's not there
424
00:17:03,860 --> 00:17:07,679
we'll close this yeah okay let's go to
425
00:17:07,679 --> 00:17:11,880
CD Etsy and we'll go to etsy's where
426
00:17:11,880 --> 00:17:13,620
most of the configuration files are in
427
00:17:13,620 --> 00:17:17,100
Linux and you go up to you'll see up
428
00:17:17,100 --> 00:17:19,260
here proxy chains four that's what I had
429
00:17:19,260 --> 00:17:21,900
wrong it's four so we're gonna go up
430
00:17:21,900 --> 00:17:24,419
Arrow here let me clear my screen all
431
00:17:24,419 --> 00:17:26,699
right so then we're gonna go mouse pad
432
00:17:26,699 --> 00:17:29,940
proxy chains four and then look at that
433
00:17:29,940 --> 00:17:31,980
all right all right here we go this is
434
00:17:31,980 --> 00:17:34,020
the configuration file for proxy chains
435
00:17:34,020 --> 00:17:36,780
what proxy chains will do is it'll allow
436
00:17:36,780 --> 00:17:41,160
you to select proxies that will then
437
00:17:41,160 --> 00:17:44,220
take your traffic and move it through a
438
00:17:44,220 --> 00:17:47,580
proxy hiding your IP and you can even
439
00:17:47,580 --> 00:17:50,340
send it through multiple procs as you
440
00:17:50,340 --> 00:17:53,460
can see here there's all of this up here
441
00:17:53,460 --> 00:17:55,980
is basically comments describing what
442
00:17:55,980 --> 00:17:58,260
they do the option below identifies how
443
00:17:58,260 --> 00:18:00,600
proxy this is treated you can have a
444
00:18:00,600 --> 00:18:02,400
dynamic chain where each connection will
445
00:18:02,400 --> 00:18:05,160
be done via chain proxies a strict chain
446
00:18:05,160 --> 00:18:08,340
okay which is what I have uncomment and
447
00:18:08,340 --> 00:18:09,660
so we'll just use a strict chain
448
00:18:09,660 --> 00:18:11,880
initially there's a round robin chain
449
00:18:11,880 --> 00:18:13,860
each connection will be done via chain
450
00:18:13,860 --> 00:18:16,980
proxies at the chain length which is a
451
00:18:16,980 --> 00:18:18,900
variable you can set the chain length
452
00:18:18,900 --> 00:18:21,000
there's a random chain each connection
453
00:18:21,000 --> 00:18:23,640
will be done via a random proxy all
454
00:18:23,640 --> 00:18:25,740
right here's a chain length by default
455
00:18:25,740 --> 00:18:28,320
it's set to three and if we scroll down
456
00:18:28,320 --> 00:18:30,600
a little further we'll see there's a
457
00:18:30,600 --> 00:18:32,520
number of other variables here here's
458
00:18:32,520 --> 00:18:35,160
the proxy list format it's going to look
459
00:18:35,160 --> 00:18:37,860
like this sucks five and then the port
460
00:18:37,860 --> 00:18:39,660
number and if there's a username and
461
00:18:39,660 --> 00:18:43,020
password okay HTTP these are all local
462
00:18:43,020 --> 00:18:44,820
IP addresses so you know that really
463
00:18:44,820 --> 00:18:47,039
those are ones that you want to use all
464
00:18:47,039 --> 00:18:50,580
right what what I've done and usually
465
00:18:50,580 --> 00:18:55,080
it's set by default within the Cali in
466
00:18:55,080 --> 00:18:58,020
this proxy chains is using the sox5 and
467
00:18:58,020 --> 00:18:59,360
then using
468
00:18:59,360 --> 00:19:03,600
127001 your local host on 90 50. this is
469
00:19:03,600 --> 00:19:08,580
tor as you know Tor is the special and
470
00:19:08,580 --> 00:19:11,820
separate network of routers okay that
471
00:19:11,820 --> 00:19:14,580
encrypts your traffic from Hop to hop to
472
00:19:14,580 --> 00:19:17,820
hop Tor was originally developed by the
473
00:19:17,820 --> 00:19:21,960
U.S Navy so that they could go ahead and
474
00:19:21,960 --> 00:19:25,080
navigate anonymously it's now an open
475
00:19:25,080 --> 00:19:28,919
source project we do know that there are
476
00:19:28,919 --> 00:19:31,559
some issues with Tor where it's not
477
00:19:31,559 --> 00:19:33,140
totally Anonymous
478
00:19:33,140 --> 00:19:36,120
institutions and intelligence agencies
479
00:19:36,120 --> 00:19:40,440
like the NSA can still crack Tor but
480
00:19:40,440 --> 00:19:43,860
it's still pretty effective for what we
481
00:19:43,860 --> 00:19:45,419
want to do here so let's go ahead and
482
00:19:45,419 --> 00:19:49,140
try it out just using Tor as a our proxy
483
00:19:49,140 --> 00:19:51,660
chain you can go ahead once you you set
484
00:19:51,660 --> 00:19:53,520
those major settings go ahead and save
485
00:19:53,520 --> 00:19:55,860
and then close it and now what you need
486
00:19:55,860 --> 00:19:59,820
to do is to go ahead and start Tour
487
00:19:59,820 --> 00:20:02,580
alright so you can go pseudo system
488
00:20:02,580 --> 00:20:06,600
control start core or enable tour so
489
00:20:06,600 --> 00:20:08,160
tour should be running now on your
490
00:20:08,160 --> 00:20:12,059
system then let's go to proxy chains you
491
00:20:12,059 --> 00:20:16,919
can use use a sudo because uh Mozilla
492
00:20:16,919 --> 00:20:19,559
doesn't like it and then just go Mozilla
493
00:20:19,559 --> 00:20:21,780
and now what this says is it runs proxy
494
00:20:21,780 --> 00:20:24,480
chains and then runs Mozilla Firefox I
495
00:20:24,480 --> 00:20:26,160
guess it's actually Firefox is the
496
00:20:26,160 --> 00:20:27,960
Mozilla is the name of the Project's
497
00:20:27,960 --> 00:20:31,080
Firefox is what it is and there we go so
498
00:20:31,080 --> 00:20:33,240
what you've done now is you've started
499
00:20:33,240 --> 00:20:35,280
um Firefox my browser but going through
500
00:20:35,280 --> 00:20:37,799
tool Network right right it's I'm
501
00:20:37,799 --> 00:20:41,160
running my Mozilla Firefox simulator to
502
00:20:41,160 --> 00:20:42,720
our Network you can see it in the
503
00:20:42,720 --> 00:20:44,340
background here let's kind of see if we
504
00:20:44,340 --> 00:20:46,500
can get both of those online yeah all
505
00:20:46,500 --> 00:20:47,820
right you can see it's running through a
506
00:20:47,820 --> 00:20:49,260
strict chain it tells us right here
507
00:20:49,260 --> 00:20:51,720
chain which means that it's only it's
508
00:20:51,720 --> 00:20:54,000
it's going to go through all of the
509
00:20:54,000 --> 00:20:55,620
proxies that you've listed in our case
510
00:20:55,620 --> 00:20:57,600
we've only listed one we've listed the
511
00:20:57,600 --> 00:21:00,360
Torah Network and then let's go and
512
00:21:00,360 --> 00:21:03,900
let's go to uh hackers arise I hear it's
513
00:21:03,900 --> 00:21:06,720
a good website I hear this too yeah lots
514
00:21:06,720 --> 00:21:08,360
of good information there that's right
515
00:21:08,360 --> 00:21:10,880
so you can see that it's going through
516
00:21:10,880 --> 00:21:14,160
and uh and it's anonymizing my traffic
517
00:21:14,160 --> 00:21:17,940
coming through the the Torah Network so
518
00:21:17,940 --> 00:21:21,419
we could use both there is a separate
519
00:21:21,419 --> 00:21:24,480
Mozilla perhaps a Mozilla a Tor Browser
520
00:21:24,480 --> 00:21:30,299
or we can use the uh Mozilla built in to
521
00:21:30,299 --> 00:21:32,640
Cali and just send it through the Torah
522
00:21:32,640 --> 00:21:34,919
Network let's check our IP on this okay
523
00:21:34,919 --> 00:21:36,780
let's go what's my IP
524
00:21:36,780 --> 00:21:38,460
yeah you live in Amsterdam now right
525
00:21:38,460 --> 00:21:41,700
Amsterdam okay Amsterdam is where it's
526
00:21:41,700 --> 00:21:44,580
at that's my location let's go and uh
527
00:21:44,580 --> 00:21:46,740
and refresh again and see if we can get
528
00:21:46,740 --> 00:21:50,220
a different tour router and this one's
529
00:21:50,220 --> 00:21:52,700
still the same same IP okay
530
00:21:52,700 --> 00:21:54,600
sometimes you can go ahead and just
531
00:21:54,600 --> 00:21:57,840
refresh it and it'll jump to another IP
532
00:21:57,840 --> 00:21:59,520
let's see if we can get another IP out
533
00:21:59,520 --> 00:22:02,340
of it you can see how slow it is this is
534
00:22:02,340 --> 00:22:04,799
one of the drawbacks to use in tor
535
00:22:04,799 --> 00:22:07,220
some of the commercial
536
00:22:07,220 --> 00:22:10,260
proxies will run a lot faster I think
537
00:22:10,260 --> 00:22:12,900
I've told the story before that when I
538
00:22:12,900 --> 00:22:15,360
was doing some work in Washington DC I
539
00:22:15,360 --> 00:22:19,140
was doing a training of FBI at the uh a
540
00:22:19,140 --> 00:22:20,760
few years back and I thought it'd be
541
00:22:20,760 --> 00:22:22,500
funny that when everybody was out at
542
00:22:22,500 --> 00:22:24,900
lunch that I was going to go ahead and
543
00:22:24,900 --> 00:22:27,720
this was when the Silk Road was still up
544
00:22:27,720 --> 00:22:30,299
and running I said I had the Silk Road
545
00:22:30,299 --> 00:22:32,220
up on the screen as they walked in from
546
00:22:32,220 --> 00:22:34,200
lunch and had all the drugs all the
547
00:22:34,200 --> 00:22:37,140
drugs for sale so so they came back from
548
00:22:37,140 --> 00:22:39,120
lunch and I had the Silk Road up on the
549
00:22:39,120 --> 00:22:40,799
screen you can tell us it's been a while
550
00:22:40,799 --> 00:22:42,600
because the Silk Road's been down for a
551
00:22:42,600 --> 00:22:43,799
while but of course there's other other
552
00:22:43,799 --> 00:22:46,440
sites now that do the same thing on the
553
00:22:46,440 --> 00:22:48,720
dark web and I said okay you guys what
554
00:22:48,720 --> 00:22:50,820
are you gonna do about this and they
555
00:22:50,820 --> 00:22:53,580
said that's not our problem that's drug
556
00:22:53,580 --> 00:22:57,179
enforcements had interestingly if you
557
00:22:57,179 --> 00:22:59,220
know the story that it actually was the
558
00:22:59,220 --> 00:23:02,039
FBI then who took down the Silk Road
559
00:23:02,039 --> 00:23:05,340
even though their response to me he was
560
00:23:05,340 --> 00:23:07,020
no that's not our job that's that's drug
561
00:23:07,020 --> 00:23:08,760
enforcement and didn't you say something
562
00:23:08,760 --> 00:23:10,440
along the lines that it was it was
563
00:23:10,440 --> 00:23:12,000
actually very fussed because it looked
564
00:23:12,000 --> 00:23:13,140
like you were using one of the local
565
00:23:13,140 --> 00:23:15,539
nodes or something exactly so I did tell
566
00:23:15,539 --> 00:23:17,340
the story here before yeah so I'm I'm
567
00:23:17,340 --> 00:23:21,419
I'm in Washington DC and I'm like gosh
568
00:23:21,419 --> 00:23:24,780
you know it's so much faster in
569
00:23:24,780 --> 00:23:27,840
Washington DC and that was before I knew
570
00:23:27,840 --> 00:23:31,740
that the NSA had nodes all around the
571
00:23:31,740 --> 00:23:33,960
Washington DC so that it was running
572
00:23:33,960 --> 00:23:35,700
just as fast as my regular internet
573
00:23:35,700 --> 00:23:39,240
would in DC because they've got no
574
00:23:39,240 --> 00:23:41,820
distributed all over DC to make sure
575
00:23:41,820 --> 00:23:43,460
that they can see all the traffic
576
00:23:43,460 --> 00:23:45,600
interestingly if you've watched the Mr
577
00:23:45,600 --> 00:23:48,380
Robot Series in the very first episode
578
00:23:48,380 --> 00:23:51,900
Elliott is able to he goes into a coffee
579
00:23:51,900 --> 00:23:54,900
shop and it's like Dan's coffee shop or
580
00:23:54,900 --> 00:23:56,640
something like that and it turns out
581
00:23:56,640 --> 00:24:00,919
that Dan is actually running a
582
00:24:01,140 --> 00:24:06,240
server from his coffee shop and uh and
583
00:24:06,240 --> 00:24:09,900
Elliot discovers this and confronts him
584
00:24:09,900 --> 00:24:12,900
with this information and he's like how
585
00:24:12,900 --> 00:24:14,640
do you know that you know how could you
586
00:24:14,640 --> 00:24:16,919
he said well because your internet is so
587
00:24:16,919 --> 00:24:19,140
fast that I was counting you to use your
588
00:24:19,140 --> 00:24:21,720
internet and then I began to wonder why
589
00:24:21,720 --> 00:24:25,260
is it so fast and so and he put up a a
590
00:24:25,260 --> 00:24:28,260
node on the Tor Network and was able to
591
00:24:28,260 --> 00:24:31,740
see the traffic going to his server and
592
00:24:31,740 --> 00:24:33,419
then got into the server and saw that
593
00:24:33,419 --> 00:24:35,700
was all
594
00:24:35,700 --> 00:24:37,500
um so that was episode one and that's an
595
00:24:37,500 --> 00:24:39,840
important lesson and Elliot says whoever
596
00:24:39,840 --> 00:24:43,559
controls the final hop on the network
597
00:24:43,559 --> 00:24:46,140
controls the traffic the onion rooting
598
00:24:46,140 --> 00:24:47,820
protocol it's not as Anonymous as you
599
00:24:47,820 --> 00:24:50,159
think it is whoever's in control of the
600
00:24:50,159 --> 00:24:52,320
exit nodes is also in control of the
601
00:24:52,320 --> 00:24:55,200
traffic which makes me
602
00:24:55,200 --> 00:24:57,720
the one in control and that's the same
603
00:24:57,720 --> 00:25:00,600
thing that the NSA knows is that they
604
00:25:00,600 --> 00:25:02,520
know whoever controls the final hot
605
00:25:02,520 --> 00:25:05,460
controls the network so he did the same
606
00:25:05,460 --> 00:25:08,159
thing it's easy you can set up a a a
607
00:25:08,159 --> 00:25:10,679
router on the Tor Network easy enough
608
00:25:10,679 --> 00:25:12,960
just go to the website and they have the
609
00:25:12,960 --> 00:25:14,760
software you can download and put
610
00:25:14,760 --> 00:25:16,980
yourself as a router on the tour Network
611
00:25:16,980 --> 00:25:18,720
so this is the problem you're telling us
612
00:25:18,720 --> 00:25:20,340
about tour but we could be still
613
00:25:20,340 --> 00:25:22,020
compromised right because they could
614
00:25:22,020 --> 00:25:24,360
have could have like exit notes exactly
615
00:25:24,360 --> 00:25:26,700
Whoever has that last exit node and
616
00:25:26,700 --> 00:25:28,620
controls the traffic I'm not going to
617
00:25:28,620 --> 00:25:30,240
refresh it one more time and see if we
618
00:25:30,240 --> 00:25:32,039
it's still sending me back to Amsterdam
619
00:25:32,039 --> 00:25:35,220
consistently I'm gonna go let's uh let's
620
00:25:35,220 --> 00:25:38,400
let's stop it and and try connecting
621
00:25:38,400 --> 00:25:40,679
again and let's see if we can't get a
622
00:25:40,679 --> 00:25:43,260
different IP address there we go and
623
00:25:43,260 --> 00:25:47,220
let's go uh what is my what is my IP is
624
00:25:47,220 --> 00:25:48,840
this coming out socket here is there
625
00:25:48,840 --> 00:25:51,600
timeouts whenever I go there let's go to
626
00:25:51,600 --> 00:25:53,039
Google again
627
00:25:53,039 --> 00:25:56,039
right here let's go what's my IP and see
628
00:25:56,039 --> 00:25:57,960
if we get a different IP this time here
629
00:25:57,960 --> 00:26:00,179
we go detecting should get a different
630
00:26:00,179 --> 00:26:04,440
IP just give me a uh the IPv6 but not
631
00:26:04,440 --> 00:26:07,320
the ipv4 yeah yet at least
632
00:26:07,320 --> 00:26:09,480
well this would actually be best right
633
00:26:09,480 --> 00:26:12,419
if it's the ipv4 is not detected but it
634
00:26:12,419 --> 00:26:15,120
does have the IPv6 and still working on
635
00:26:15,120 --> 00:26:17,400
it and it still comes back with not
636
00:26:17,400 --> 00:26:19,620
detected so you could make the case that
637
00:26:19,620 --> 00:26:21,480
that's even better that's not detecting
638
00:26:21,480 --> 00:26:23,039
it but but I think it's basically the
639
00:26:23,039 --> 00:26:25,799
website is the problem in that
640
00:26:25,799 --> 00:26:29,640
um and that the IP address is not uh no
641
00:26:29,640 --> 00:26:31,559
okay so I'm going to go ahead and shut
642
00:26:31,559 --> 00:26:33,179
this down I'm going to go ahead and shut
643
00:26:33,179 --> 00:26:36,179
down our our proxy chains one of the
644
00:26:36,179 --> 00:26:38,700
other things that I wanted to show is
645
00:26:38,700 --> 00:26:42,299
that um there's actually a tool called a
646
00:26:42,299 --> 00:26:44,700
non-surf that you can install on your
647
00:26:44,700 --> 00:26:47,700
Cali that will automatically send all
648
00:26:47,700 --> 00:26:51,419
your traffic okay through Tor so let's
649
00:26:51,419 --> 00:26:54,080
go there
650
00:26:54,659 --> 00:26:56,940
okay we've got it installed now all
651
00:26:56,940 --> 00:26:59,460
right so now we've got a directory
652
00:26:59,460 --> 00:27:01,980
called Kalyan on surf let's just take a
653
00:27:01,980 --> 00:27:04,740
look and see where it's at all right
654
00:27:04,740 --> 00:27:07,080
here's Cali and on surf right here
655
00:27:07,080 --> 00:27:10,700
let's go into that directory
656
00:27:17,940 --> 00:27:21,059
okay let's take a look inside there
657
00:27:21,059 --> 00:27:23,760
there's the installer and then we gotta
658
00:27:23,760 --> 00:27:26,940
run sudo
659
00:27:28,880 --> 00:27:32,360
installer sh
660
00:27:34,640 --> 00:27:37,559
gives me a ears while processing and see
661
00:27:37,559 --> 00:27:40,559
if we can get it to run okay go pseudo
662
00:27:40,559 --> 00:27:42,659
and then
663
00:27:42,659 --> 00:27:44,820
surf
664
00:27:44,820 --> 00:27:47,480
start
665
00:27:48,059 --> 00:27:51,000
there it is we're running that surf okay
666
00:27:51,000 --> 00:27:52,559
you can see it's killing dangerous
667
00:27:52,559 --> 00:27:54,659
applications cleaning some dangerous
668
00:27:54,659 --> 00:27:57,240
cash elements stopping IPv6 starting
669
00:27:57,240 --> 00:28:00,000
Anonymous mode saving IP tables rules
670
00:28:00,000 --> 00:28:03,000
modified resolve dot confuse tour and
671
00:28:03,000 --> 00:28:05,700
private internet access DNS all traffic
672
00:28:05,700 --> 00:28:08,100
was redirected through Tor and you're
673
00:28:08,100 --> 00:28:11,100
under an non-served tunnel so now what
674
00:28:11,100 --> 00:28:13,620
happens is that everything you do on
675
00:28:13,620 --> 00:28:15,900
this operating system is going to go
676
00:28:15,900 --> 00:28:17,760
through the Torah Network it's going to
677
00:28:17,760 --> 00:28:19,080
be a little bit slower but it's going to
678
00:28:19,080 --> 00:28:24,200
give you better anonymity than it would
679
00:28:24,200 --> 00:28:27,059
otherwise so your IP address is going to
680
00:28:27,059 --> 00:28:29,520
be hidden except for the from the person
681
00:28:29,520 --> 00:28:31,620
who has the exit node on the Torah
682
00:28:31,620 --> 00:28:32,820
Network
683
00:28:32,820 --> 00:28:34,320
um and hope and hopefully that's not the
684
00:28:34,320 --> 00:28:36,779
NSA or the law enforcement so a couple
685
00:28:36,779 --> 00:28:38,159
of the things that we want to talk about
686
00:28:38,159 --> 00:28:41,159
we talked about using you know a browser
687
00:28:41,159 --> 00:28:44,159
like Brave okay that's not and not uh
688
00:28:44,159 --> 00:28:46,440
collecting cookies along cookies on your
689
00:28:46,440 --> 00:28:48,000
browser one of the things that people
690
00:28:48,000 --> 00:28:51,179
often ask me about is what's the safest
691
00:28:51,179 --> 00:28:53,940
operating system and there's a number of
692
00:28:53,940 --> 00:28:56,340
them that are out there that you know
693
00:28:56,340 --> 00:28:58,620
all of them all of them pretty much are
694
00:28:58,620 --> 00:29:02,159
using the Tor Network to make you more
695
00:29:02,159 --> 00:29:05,820
secure I found that using Kali using the
696
00:29:05,820 --> 00:29:08,039
announcer is actually works pretty good
697
00:29:08,039 --> 00:29:10,080
pushing everything through the Torah
698
00:29:10,080 --> 00:29:11,820
Network the other issues that people
699
00:29:11,820 --> 00:29:14,700
often ask me about is how about using a
700
00:29:14,700 --> 00:29:17,520
phone isn't a phone a major
701
00:29:17,520 --> 00:29:20,820
vulnerability trying to whether it be
702
00:29:20,820 --> 00:29:23,100
Android or Apple because both of them
703
00:29:23,100 --> 00:29:26,279
can be hacked by Pegasus right and so
704
00:29:26,279 --> 00:29:27,840
one of the things about your phone is
705
00:29:27,840 --> 00:29:30,960
that you probably don't want to use your
706
00:29:30,960 --> 00:29:32,700
actual phone whenever you're doing
707
00:29:32,700 --> 00:29:34,860
anything that where you want to remain
708
00:29:34,860 --> 00:29:37,980
anonymous because the data that's
709
00:29:37,980 --> 00:29:40,200
collected from your phone is all
710
00:29:40,200 --> 00:29:42,480
available to law enforcement they can
711
00:29:42,480 --> 00:29:45,539
trace your your geolocation they can see
712
00:29:45,539 --> 00:29:47,940
your messages one of the things that I
713
00:29:47,940 --> 00:29:50,340
recommend is to go out and buy a burger
714
00:29:50,340 --> 00:29:52,620
phone a burger phone is simply a phone
715
00:29:52,620 --> 00:29:55,820
it could be a cheap phone if you go into
716
00:29:55,820 --> 00:29:58,140
some of the phone stores you can buy
717
00:29:58,140 --> 00:30:00,360
these phones that are inexpensive I
718
00:30:00,360 --> 00:30:01,740
think I've bought some of them as little
719
00:30:01,740 --> 00:30:04,620
as twenty dollars thirty dollars and put
720
00:30:04,620 --> 00:30:07,080
them on a pay-as-you-go contract where
721
00:30:07,080 --> 00:30:09,240
you pay cash for them and then that's
722
00:30:09,240 --> 00:30:11,460
really really difficult to trace there's
723
00:30:11,460 --> 00:30:14,520
no way to connect that phone to your
724
00:30:14,520 --> 00:30:16,980
identity and so then you can go ahead
725
00:30:16,980 --> 00:30:19,500
and make your calls and your messages
726
00:30:19,500 --> 00:30:21,659
from that phone one of the things you
727
00:30:21,659 --> 00:30:23,820
want to keep in mind though is that when
728
00:30:23,820 --> 00:30:26,940
you go to buy that phone that you're not
729
00:30:26,940 --> 00:30:29,760
traveling with that your other phone in
730
00:30:29,760 --> 00:30:33,779
your pocket because you're you can be
731
00:30:33,779 --> 00:30:37,500
then traced to the purchase of that
732
00:30:37,500 --> 00:30:39,059
phone okay because every one of your
733
00:30:39,059 --> 00:30:42,059
steps is being followed whenever you're
734
00:30:42,059 --> 00:30:44,120
traveling with your phone there's always
735
00:30:44,120 --> 00:30:46,080
geolocation that's available because
736
00:30:46,080 --> 00:30:47,760
your phone is connecting to the cell
737
00:30:47,760 --> 00:30:49,799
phone phone towers and from the cell
738
00:30:49,799 --> 00:30:51,659
phone towers they have to get your
739
00:30:51,659 --> 00:30:54,539
location now it's not as precise as GPS
740
00:30:54,539 --> 00:30:56,580
but it's still they can tell if you're
741
00:30:56,580 --> 00:30:59,580
going into a store to buy the phone they
742
00:30:59,580 --> 00:31:02,460
can trace you that close so don't take
743
00:31:02,460 --> 00:31:04,860
your phone with you all right go buy
744
00:31:04,860 --> 00:31:06,899
your burner phone use your burner phone
745
00:31:06,899 --> 00:31:08,340
for anything you want to remain
746
00:31:08,340 --> 00:31:11,580
anonymous do not do any of the same
747
00:31:11,580 --> 00:31:15,240
things on your usual phone your normal
748
00:31:15,240 --> 00:31:18,059
phone as you would do on your burner
749
00:31:18,059 --> 00:31:20,279
phone do not go to the same websites
750
00:31:20,279 --> 00:31:23,279
don't go use the same browsers and so
751
00:31:23,279 --> 00:31:25,919
that's kind of the rules of thumb for
752
00:31:25,919 --> 00:31:28,799
using a burger film ultimately if you
753
00:31:28,799 --> 00:31:31,620
really want to remain anonymous I
754
00:31:31,620 --> 00:31:35,100
recommend using two separate systems
755
00:31:35,100 --> 00:31:38,100
this is if you can afford it this is
756
00:31:38,100 --> 00:31:40,200
probably the best way to go of course
757
00:31:40,200 --> 00:31:42,299
you know you could have two separate
758
00:31:42,299 --> 00:31:45,419
internet services all right or you know
759
00:31:45,419 --> 00:31:47,340
you can hack your neighbor's Wi-Fi you
760
00:31:47,340 --> 00:31:49,799
can use their that service I'm not
761
00:31:49,799 --> 00:31:50,880
recommending that you do that but
762
00:31:50,880 --> 00:31:53,580
someone else I would never recommend
763
00:31:53,580 --> 00:31:55,559
that I'll never recommend that no
764
00:31:55,559 --> 00:31:57,720
and then you could use somebody else's
765
00:31:57,720 --> 00:32:00,299
IP address maybe but keeping your
766
00:32:00,299 --> 00:32:01,980
activities separate in two separate
767
00:32:01,980 --> 00:32:04,980
systems is going to be one of the safest
768
00:32:04,980 --> 00:32:06,419
things that you can do because you're
769
00:32:06,419 --> 00:32:08,100
using a different browser you're using
770
00:32:08,100 --> 00:32:10,740
different uh operating system you're
771
00:32:10,740 --> 00:32:12,779
using a different IP address so they
772
00:32:12,779 --> 00:32:15,179
can't be connected back to you one of
773
00:32:15,179 --> 00:32:17,220
the things I also do is that I create
774
00:32:17,220 --> 00:32:20,279
false profiles I I put false information
775
00:32:20,279 --> 00:32:22,679
out on the internet so that that
776
00:32:22,679 --> 00:32:24,840
information doesn't need back to me
777
00:32:24,840 --> 00:32:26,580
people try to connect that information
778
00:32:26,580 --> 00:32:29,700
to the lead but it really is false
779
00:32:29,700 --> 00:32:31,799
information that's going to be you know
780
00:32:31,799 --> 00:32:33,840
there's breadcrumbs out there somebody's
781
00:32:33,840 --> 00:32:34,980
going to follow and it's going to take
782
00:32:34,980 --> 00:32:36,720
them to the wrong place and if they
783
00:32:36,720 --> 00:32:38,399
follow all the bread comes it's going to
784
00:32:38,399 --> 00:32:40,320
take them to separate identities this is
785
00:32:40,320 --> 00:32:42,899
the kind of work that you need to do to
786
00:32:42,899 --> 00:32:46,080
truly remain anonymous because there's
787
00:32:46,080 --> 00:32:48,240
an awful lot of information that's out
788
00:32:48,240 --> 00:32:51,299
there about you from OS in sources from
789
00:32:51,299 --> 00:32:54,179
your cookies from your IP address and to
790
00:32:54,179 --> 00:32:56,039
really remain anonymous it's like a a
791
00:32:56,039 --> 00:32:58,260
full-time job you have to think about
792
00:32:58,260 --> 00:33:00,840
everything that you do on the internet
793
00:33:00,840 --> 00:33:03,720
and whether or not it's going to leave a
794
00:33:03,720 --> 00:33:06,779
trace back to you is it safe for me to
795
00:33:06,779 --> 00:33:08,940
use an ISP or or should are there
796
00:33:08,940 --> 00:33:10,380
certain isps that you recommend I think
797
00:33:10,380 --> 00:33:11,700
starlink was one that we've kind of
798
00:33:11,700 --> 00:33:13,260
mentioned in the past well I use
799
00:33:13,260 --> 00:33:15,179
starlink and I use starlink primarily
800
00:33:15,179 --> 00:33:18,419
because they their IP addresses are not
801
00:33:18,419 --> 00:33:21,000
geo-located right so if you go and
802
00:33:21,000 --> 00:33:22,799
somebody looks at your IP address all
803
00:33:22,799 --> 00:33:23,880
it's going to do is it's going to take
804
00:33:23,880 --> 00:33:26,159
them to a regional office of starting so
805
00:33:26,159 --> 00:33:28,740
I find Starlight to be just create one
806
00:33:28,740 --> 00:33:33,059
more level of anonymity into your
807
00:33:33,059 --> 00:33:35,100
traffic on the internet it just all it's
808
00:33:35,100 --> 00:33:37,140
going to do is going to say hey it's a
809
00:33:37,140 --> 00:33:39,179
starlink IP address now if starting
810
00:33:39,179 --> 00:33:41,340
wants to give up your identity then
811
00:33:41,340 --> 00:33:43,200
that's a different thing or a starting
812
00:33:43,200 --> 00:33:46,519
gets hacked then your identity can be
813
00:33:46,519 --> 00:33:50,779
resolved from that but most isps
814
00:33:50,779 --> 00:33:53,580
distribute IP addresses by location
815
00:33:53,580 --> 00:33:56,279
right so somebody can find out what City
816
00:33:56,279 --> 00:33:58,620
you're in not with 100 accuracy but
817
00:33:58,620 --> 00:34:00,240
pretty close to it what city you're in
818
00:34:00,240 --> 00:34:02,279
simply buy your IP address knowing
819
00:34:02,279 --> 00:34:05,760
there's there is these databases of IP
820
00:34:05,760 --> 00:34:07,980
addresses and cities so so I would say
821
00:34:07,980 --> 00:34:10,859
to create one more level of anonymity I
822
00:34:10,859 --> 00:34:13,440
like starlink and then run starlink say
823
00:34:13,440 --> 00:34:18,060
through proxies or vpns or Tor so a
824
00:34:18,060 --> 00:34:19,560
great thing about stalling is you can
825
00:34:19,560 --> 00:34:21,720
often buy this mobile solution can't you
826
00:34:21,720 --> 00:34:23,280
so you could drive around and you know
827
00:34:23,280 --> 00:34:25,139
you doesn't matter where you are you
828
00:34:25,139 --> 00:34:26,580
could take it with you and then you
829
00:34:26,580 --> 00:34:28,080
could access the internet from different
830
00:34:28,080 --> 00:34:30,659
physical locations but I like what you
831
00:34:30,659 --> 00:34:32,580
said there because if I use internet at
832
00:34:32,580 --> 00:34:34,320
my house as an example and it's a fiber
833
00:34:34,320 --> 00:34:35,940
link or something like that I mean it's
834
00:34:35,940 --> 00:34:37,679
tied directly to my my house it's very
835
00:34:37,679 --> 00:34:39,540
easy to find me right but exactly I
836
00:34:39,540 --> 00:34:41,580
could be anywhere starlink allows you to
837
00:34:41,580 --> 00:34:44,220
be mobile they charge an extra 25 a
838
00:34:44,220 --> 00:34:46,399
month that gives you mobile and so the
839
00:34:46,399 --> 00:34:49,139
Satellite Dish can move around it
840
00:34:49,139 --> 00:34:51,359
automatically unlike some of the old
841
00:34:51,359 --> 00:34:53,399
satellite technology where you were
842
00:34:53,399 --> 00:34:56,099
fixed on a single satellite in in
843
00:34:56,099 --> 00:34:57,839
starting they have thousands of
844
00:34:57,839 --> 00:35:00,480
satellites and the dish is smart enough
845
00:35:00,480 --> 00:35:03,599
to find the closest satellite so as
846
00:35:03,599 --> 00:35:06,300
you're moving it goes and finds the note
847
00:35:06,300 --> 00:35:09,480
the closest satellite to you makes it
848
00:35:09,480 --> 00:35:12,240
much harder to be able to geo-locate you
849
00:35:12,240 --> 00:35:13,619
when you're using Starbucks I mean
850
00:35:13,619 --> 00:35:15,359
that's at least like I'm trying to think
851
00:35:15,359 --> 00:35:17,940
in layers okay so how do I get to the
852
00:35:17,940 --> 00:35:19,380
internet I could use stalling I could
853
00:35:19,380 --> 00:35:21,000
for instance go to McDonald's or
854
00:35:21,000 --> 00:35:22,200
somewhere else and get onto the internet
855
00:35:22,200 --> 00:35:24,300
that way but then I've got to all sort
856
00:35:24,300 --> 00:35:26,400
and look cold train station or somewhere
857
00:35:26,400 --> 00:35:27,839
you know get onto the internet somewhere
858
00:35:27,839 --> 00:35:30,300
somehow at least with stalling I'm I've
859
00:35:30,300 --> 00:35:31,800
got something with me that I can take
860
00:35:31,800 --> 00:35:34,500
her on yes yeah you can if you're you
861
00:35:34,500 --> 00:35:36,500
can put it in your vehicle
862
00:35:36,500 --> 00:35:38,760
you know if you're if you're traveling
863
00:35:38,760 --> 00:35:41,640
you can take it with you and it will
864
00:35:41,640 --> 00:35:43,079
automatically connect and there's
865
00:35:43,079 --> 00:35:45,960
nothing there's no geolocation that's
866
00:35:45,960 --> 00:35:47,760
assigned to it although you know you
867
00:35:47,760 --> 00:35:50,280
have to pay for with a credit card so
868
00:35:50,280 --> 00:35:52,200
your name is still linked to that IP
869
00:35:52,200 --> 00:35:55,079
address if somebody gets inside of
870
00:35:55,079 --> 00:35:57,540
starlink or Starling gives up your
871
00:35:57,540 --> 00:36:00,180
information now to you know starlink is
872
00:36:00,180 --> 00:36:02,579
an American company as we all know owned
873
00:36:02,579 --> 00:36:04,800
by Elon Musk and Elon Musk wants to give
874
00:36:04,800 --> 00:36:07,260
up the information about you then you're
875
00:36:07,260 --> 00:36:09,359
still not Anonymous but at least it's
876
00:36:09,359 --> 00:36:11,220
one layer um it's one layer and that's
877
00:36:11,220 --> 00:36:12,420
what you think about you're right you
878
00:36:12,420 --> 00:36:14,760
gotta think about later layers right
879
00:36:14,760 --> 00:36:16,859
this is one layer that makes it just a
880
00:36:16,859 --> 00:36:18,540
little bit more difficult to identify
881
00:36:18,540 --> 00:36:20,460
you next one and this is always a
882
00:36:20,460 --> 00:36:22,079
question people have do I use a Windows
883
00:36:22,079 --> 00:36:24,660
computer do I use apple do I use Linux
884
00:36:24,660 --> 00:36:27,780
or you know Apple Windows seem to both
885
00:36:27,780 --> 00:36:30,240
have a lot of like data that they pull
886
00:36:30,240 --> 00:36:32,280
from your Telemetry data that they pull
887
00:36:32,280 --> 00:36:33,359
from you
888
00:36:33,359 --> 00:36:35,160
um a lot of people don't trust them so
889
00:36:35,160 --> 00:36:37,200
perhaps Linux is the best Well I
890
00:36:37,200 --> 00:36:40,079
obviously would recommend Linux one of
891
00:36:40,079 --> 00:36:43,079
the things that that both apple and
892
00:36:43,079 --> 00:36:46,680
Microsoft do is that they put in user
893
00:36:46,680 --> 00:36:50,579
IDs a guid into documents and so that if
894
00:36:50,579 --> 00:36:53,339
you if you're creating a document and
895
00:36:53,339 --> 00:36:55,020
you're just Distributing that document
896
00:36:55,020 --> 00:36:57,839
it could be true increased right back to
897
00:36:57,839 --> 00:37:00,000
your computer one of the things I
898
00:37:00,000 --> 00:37:03,119
recommend is do not use Microsoft Word
899
00:37:03,119 --> 00:37:06,060
or the whole Suite of Microsoft products
900
00:37:06,060 --> 00:37:08,820
because they'll pull the the globally
901
00:37:08,820 --> 00:37:11,040
unique ID off the machine and put it
902
00:37:11,040 --> 00:37:13,680
into the document this is where
903
00:37:13,680 --> 00:37:16,980
forensics becomes really critical so you
904
00:37:16,980 --> 00:37:18,480
know if you're a forensic investigator
905
00:37:18,480 --> 00:37:20,579
you know that you know that there's a
906
00:37:20,579 --> 00:37:23,880
globally unique ID on that word document
907
00:37:23,880 --> 00:37:26,160
so if you're trying to trace somebody
908
00:37:26,160 --> 00:37:28,140
you can pull that globally unique ID
909
00:37:28,140 --> 00:37:32,339
it's not going to have geolocation data
910
00:37:32,339 --> 00:37:35,280
in it but once your machines identified
911
00:37:35,280 --> 00:37:37,980
they can say that this document came
912
00:37:37,980 --> 00:37:40,260
from this machine is it safe enough to
913
00:37:40,260 --> 00:37:42,000
use a virtual machine or should I have a
914
00:37:42,000 --> 00:37:43,680
dedicated physical machine that runs
915
00:37:43,680 --> 00:37:45,960
Linux physical machine creates one more
916
00:37:45,960 --> 00:37:48,420
layer if you're going to run multiple
917
00:37:48,420 --> 00:37:50,940
machines I would recommend one one
918
00:37:50,940 --> 00:37:52,920
machine that you're doing stuff that you
919
00:37:52,920 --> 00:37:54,480
don't want to be traced on and one
920
00:37:54,480 --> 00:37:55,440
machine that you're doing everything
921
00:37:55,440 --> 00:37:57,599
thing else if you can afford that if you
922
00:37:57,599 --> 00:38:00,000
can't afford that I would say run a
923
00:38:00,000 --> 00:38:02,940
Linux machine in a virtual machine such
924
00:38:02,940 --> 00:38:06,000
as virtualbox or VMware Workstation it's
925
00:38:06,000 --> 00:38:07,619
all about like cost versus what you're
926
00:38:07,619 --> 00:38:08,940
really trying to accomplish right so I
927
00:38:08,940 --> 00:38:11,040
mean if you really want to go hardcore
928
00:38:11,040 --> 00:38:12,480
you go to you've got to spend the money
929
00:38:12,480 --> 00:38:14,400
to to do something like that I would say
930
00:38:14,400 --> 00:38:16,380
yeah yeah if you want to really make
931
00:38:16,380 --> 00:38:18,180
sure that you're you're not going to be
932
00:38:18,180 --> 00:38:20,099
traced you want to go and spend a little
933
00:38:20,099 --> 00:38:22,260
bit of money possibly have two systems
934
00:38:22,260 --> 00:38:24,780
okay one of them that you're only doing
935
00:38:24,780 --> 00:38:26,940
the work you're gonna have a separate
936
00:38:26,940 --> 00:38:29,460
identity for each machine right and you
937
00:38:29,460 --> 00:38:31,560
can create separate identities and not
938
00:38:31,560 --> 00:38:33,839
have them be connected in any way shape
939
00:38:33,839 --> 00:38:36,180
or form so like we mentioned stalling so
940
00:38:36,180 --> 00:38:37,500
as an example I could have like an
941
00:38:37,500 --> 00:38:39,420
internet connection at home that's my
942
00:38:39,420 --> 00:38:40,980
normal internet let's say fiber whatever
943
00:38:40,980 --> 00:38:42,780
and then I have a starlink which I do
944
00:38:42,780 --> 00:38:45,599
all my Anonymous stuff on and then I
945
00:38:45,599 --> 00:38:47,220
have like a Linux machine that I use for
946
00:38:47,220 --> 00:38:48,480
my Anonymous stuff and then perhaps
947
00:38:48,480 --> 00:38:50,160
whatever operating system I like for my
948
00:38:50,160 --> 00:38:52,680
normal stuff what about phones because
949
00:38:52,680 --> 00:38:55,380
like um they all seem to be you know to
950
00:38:55,380 --> 00:38:57,660
choose the worst type it's like is it
951
00:38:57,660 --> 00:38:59,460
iOS is it Android or do I have to go and
952
00:38:59,460 --> 00:39:00,780
use graphene or something like that
953
00:39:00,780 --> 00:39:02,700
that's a good question
954
00:39:02,700 --> 00:39:04,619
um basically the most important thing I
955
00:39:04,619 --> 00:39:07,200
think is simply have a phone that isn't
956
00:39:07,200 --> 00:39:09,300
linked to any carrier right so any
957
00:39:09,300 --> 00:39:10,980
carrier in any credit card because once
958
00:39:10,980 --> 00:39:13,079
you've linked a credit card you pay for
959
00:39:13,079 --> 00:39:14,460
it by credit card or have a service
960
00:39:14,460 --> 00:39:16,460
through any one of the major carriers
961
00:39:16,460 --> 00:39:19,560
then you can be traced these burner
962
00:39:19,560 --> 00:39:21,660
phones that you can buy for cash you can
963
00:39:21,660 --> 00:39:23,460
pay for them with cash the service for
964
00:39:23,460 --> 00:39:25,800
cash the month-to-month the service uh
965
00:39:25,800 --> 00:39:28,140
with cash that's really the only way to
966
00:39:28,140 --> 00:39:30,359
remain to make certain that you're going
967
00:39:30,359 --> 00:39:32,460
to remain anonymous and like I said they
968
00:39:32,460 --> 00:39:34,740
they should not be in the same location
969
00:39:34,740 --> 00:39:37,859
right at the same time right if if
970
00:39:37,859 --> 00:39:39,420
they're in the same location same time
971
00:39:39,420 --> 00:39:41,280
one of them has to be turned off because
972
00:39:41,280 --> 00:39:43,320
once they're in the same location then
973
00:39:43,320 --> 00:39:45,060
they can be tied together to your
974
00:39:45,060 --> 00:39:47,640
location and your identity so in other
975
00:39:47,640 --> 00:39:49,260
words graphene by itself wouldn't be
976
00:39:49,260 --> 00:39:51,240
enough you'd want to buy a Bono phone
977
00:39:51,240 --> 00:39:52,500
with cash or something because it's not
978
00:39:52,500 --> 00:39:53,760
the operating system that's a problem
979
00:39:53,760 --> 00:39:55,260
it's the fact that it can be traced to
980
00:39:55,260 --> 00:39:58,320
you right exactly exactly that's I agree
981
00:39:58,320 --> 00:40:01,079
it's I what I feel safest with is simply
982
00:40:01,079 --> 00:40:03,119
using a burner phone right that's what I
983
00:40:03,119 --> 00:40:05,520
feel confident that can't be traced and
984
00:40:05,520 --> 00:40:07,640
what about VPN versus Tor there's this
985
00:40:07,640 --> 00:40:10,560
always good argument on YouTube and you
986
00:40:10,560 --> 00:40:12,000
know on the internet and that's why it's
987
00:40:12,000 --> 00:40:13,859
great to get your opinion because you're
988
00:40:13,859 --> 00:40:15,300
well experiencing this should I use a
989
00:40:15,300 --> 00:40:19,200
VPN like XYZ VPN or should I use tool or
990
00:40:19,200 --> 00:40:21,300
should I use Tor over a VPN or you know
991
00:40:21,300 --> 00:40:23,099
what would you recommend it all depends
992
00:40:23,099 --> 00:40:25,320
upon you know how much protection that
993
00:40:25,320 --> 00:40:28,020
you want VPN for the average individual
994
00:40:28,020 --> 00:40:30,119
who's trying to protect themselves from
995
00:40:30,119 --> 00:40:32,820
Commercial Services VPN generally are
996
00:40:32,820 --> 00:40:34,079
going to be pretty good but remember
997
00:40:34,079 --> 00:40:36,300
that you're putting your hands you're
998
00:40:36,300 --> 00:40:38,520
putting your life maybe into the hands
999
00:40:38,520 --> 00:40:42,119
of the VPN developer they have all of
1000
00:40:42,119 --> 00:40:44,339
your information if they get hacked
1001
00:40:44,339 --> 00:40:46,800
right and they do get hacked then all of
1002
00:40:46,800 --> 00:40:48,480
your information is available so that's
1003
00:40:48,480 --> 00:40:50,520
a trust that you have to place in them
1004
00:40:50,520 --> 00:40:52,859
so for the average user a VPN is going
1005
00:40:52,859 --> 00:40:55,079
to be fine if you're working in cyber
1006
00:40:55,079 --> 00:40:57,599
War Warfare where your life is dependent
1007
00:40:57,599 --> 00:41:00,240
upon the remaining Anonymous that may
1008
00:41:00,240 --> 00:41:02,280
not be adequate in that case that a
1009
00:41:02,280 --> 00:41:04,320
cyber warfare environment where your
1010
00:41:04,320 --> 00:41:06,900
life isn't in is dependent upon
1011
00:41:06,900 --> 00:41:09,119
remaining Anonymous I would prefer
1012
00:41:09,119 --> 00:41:12,599
either proxies or the Tor Network
1013
00:41:12,599 --> 00:41:15,599
proxies can pose a an additional problem
1014
00:41:15,599 --> 00:41:17,880
once again that they can be hacked as
1015
00:41:17,880 --> 00:41:20,640
well I would never trust a free proxy
1016
00:41:20,640 --> 00:41:23,160
right because why would somebody put up
1017
00:41:23,160 --> 00:41:25,140
a free proxy why would somebody put out
1018
00:41:25,140 --> 00:41:29,540
[Laughter]
1019
00:41:29,540 --> 00:41:33,119
or it's a GRU or whoever so remember
1020
00:41:33,119 --> 00:41:35,220
that the NSA the gru all the
1021
00:41:35,220 --> 00:41:37,079
intelligence agencies one of the things
1022
00:41:37,079 --> 00:41:39,240
that they want to know is everybody's
1023
00:41:39,240 --> 00:41:41,880
identity they know that people use
1024
00:41:41,880 --> 00:41:45,960
proxies so their job is to figure out
1025
00:41:45,960 --> 00:41:48,480
who you are and what you're doing if you
1026
00:41:48,480 --> 00:41:50,640
were them and your job was to find that
1027
00:41:50,640 --> 00:41:52,859
out wouldn't you put up free proxies
1028
00:41:52,859 --> 00:41:55,740
here connect to our free proxy and of
1029
00:41:55,740 --> 00:41:57,900
course we keep no logs and of course
1030
00:41:57,900 --> 00:42:00,000
that's what they advertise and that way
1031
00:42:00,000 --> 00:42:01,980
they can at least get some of the
1032
00:42:01,980 --> 00:42:04,320
traffic going through their proxies it
1033
00:42:04,320 --> 00:42:06,720
doesn't make any money so they have no
1034
00:42:06,720 --> 00:42:09,119
business model to if there's no
1035
00:42:09,119 --> 00:42:11,280
legitimate business model to keep them
1036
00:42:11,280 --> 00:42:13,500
safe if somebody's putting up a free
1037
00:42:13,500 --> 00:42:16,079
proxy there's no legitimate business
1038
00:42:16,079 --> 00:42:18,359
interest to keeping you safe as a matter
1039
00:42:18,359 --> 00:42:20,160
of fact there's an interest in keeping
1040
00:42:20,160 --> 00:42:23,099
you unsafe and selling your data so I
1041
00:42:23,099 --> 00:42:24,720
recommend if you're going to use a proxy
1042
00:42:24,720 --> 00:42:27,180
use a commercial proxy where you're are
1043
00:42:27,180 --> 00:42:29,640
paying somebody to keep you safe so
1044
00:42:29,640 --> 00:42:31,079
let's take you to the extreme I mean
1045
00:42:31,079 --> 00:42:33,240
let's say you want to your life depends
1046
00:42:33,240 --> 00:42:34,859
on it you're a journalist or someone
1047
00:42:34,859 --> 00:42:36,119
who's involved in cyber warfare
1048
00:42:36,119 --> 00:42:37,740
something like that you really want to
1049
00:42:37,740 --> 00:42:40,020
keep yourself safe so if I've if I
1050
00:42:40,020 --> 00:42:40,920
understand correctly you're going to
1051
00:42:40,920 --> 00:42:43,140
have two infrastructures one for like
1052
00:42:43,140 --> 00:42:45,359
normal and then one for
1053
00:42:45,359 --> 00:42:47,400
um Anonymous stuff so starlink or
1054
00:42:47,400 --> 00:42:49,020
whatever it is separate infrastructure
1055
00:42:49,020 --> 00:42:51,240
separate laptops separate phones Bono
1056
00:42:51,240 --> 00:42:52,800
phones you're gonna buy that with cash
1057
00:42:52,800 --> 00:42:55,859
if you can you're going to use
1058
00:42:55,859 --> 00:42:57,900
um proxy chains or you're going to use
1059
00:42:57,900 --> 00:42:59,819
tall or something like that is that
1060
00:42:59,819 --> 00:43:01,319
right anything else that I've missed no
1061
00:43:01,319 --> 00:43:03,060
I think that that pretty much covers
1062
00:43:03,060 --> 00:43:04,680
them I just want to make sure that when
1063
00:43:04,680 --> 00:43:06,599
you're using those two separate systems
1064
00:43:06,599 --> 00:43:09,420
that they do not intersect the the sites
1065
00:43:09,420 --> 00:43:11,579
that you visit the things that you do
1066
00:43:11,579 --> 00:43:14,099
the information that you provide do not
1067
00:43:14,099 --> 00:43:16,619
intersect because that intersection can
1068
00:43:16,619 --> 00:43:19,680
be detected by people who are trying to
1069
00:43:19,680 --> 00:43:21,480
determine your identity do I need
1070
00:43:21,480 --> 00:43:23,220
separate homes or separate locations
1071
00:43:23,220 --> 00:43:25,319
like like you said the phone I mean I'm
1072
00:43:25,319 --> 00:43:26,460
just trying to think like you said don't
1073
00:43:26,460 --> 00:43:28,740
and put the two phones together right so
1074
00:43:28,740 --> 00:43:30,119
I'm gonna have to put that don't put the
1075
00:43:30,119 --> 00:43:33,960
don't put two phones together ah okay I
1076
00:43:33,960 --> 00:43:35,880
mean you could put one of them in a
1077
00:43:35,880 --> 00:43:38,040
faraday cage okay just so that the
1078
00:43:38,040 --> 00:43:40,319
location doesn't show the geolocation
1079
00:43:40,319 --> 00:43:42,480
Services don't show them being in the
1080
00:43:42,480 --> 00:43:44,220
same location because once you've
1081
00:43:44,220 --> 00:43:46,260
revealed that so for instance if you
1082
00:43:46,260 --> 00:43:48,060
have an Apple phone and you've got a
1083
00:43:48,060 --> 00:43:49,619
burner phone and they're both sitting in
1084
00:43:49,619 --> 00:43:51,540
your office and they're both on right
1085
00:43:51,540 --> 00:43:53,819
they're both showing that they're in the
1086
00:43:53,819 --> 00:43:56,099
same location you've subtly given away
1087
00:43:56,099 --> 00:43:59,339
your identity as the person who owns the
1088
00:43:59,339 --> 00:44:02,040
iPhone right that burner phone has been
1089
00:44:02,040 --> 00:44:04,800
now been linked to that iPhone so you
1090
00:44:04,800 --> 00:44:06,660
put the burner phone in the Faraday cage
1091
00:44:06,660 --> 00:44:08,640
or you leave it somewhere else and you
1092
00:44:08,640 --> 00:44:10,740
don't bring it to your home where you do
1093
00:44:10,740 --> 00:44:12,300
your normal stuff or you just turn it
1094
00:44:12,300 --> 00:44:13,920
off what I really appreciate about
1095
00:44:13,920 --> 00:44:15,180
occupy the web for everyone who's
1096
00:44:15,180 --> 00:44:16,560
watching is he doesn't it's not
1097
00:44:16,560 --> 00:44:18,839
sensationalist nonsense he's giving you
1098
00:44:18,839 --> 00:44:21,240
the you know really good information so
1099
00:44:21,240 --> 00:44:23,040
okay by the web thanks for doing that of
1100
00:44:23,040 --> 00:44:25,500
course anytime David So occupy the web
1101
00:44:25,500 --> 00:44:26,400
another one we didn't touch on this
1102
00:44:26,400 --> 00:44:29,040
email do you have any email providers
1103
00:44:29,040 --> 00:44:30,780
that you could recommend for secure
1104
00:44:30,780 --> 00:44:32,160
email because email seems to be one of
1105
00:44:32,160 --> 00:44:33,599
those things that's it's easy to find
1106
00:44:33,599 --> 00:44:36,540
people yes email can easily be traced
1107
00:44:36,540 --> 00:44:39,180
and so one of the things that I like and
1108
00:44:39,180 --> 00:44:41,760
those people who have worked with me and
1109
00:44:41,760 --> 00:44:43,980
been my students or in some way
1110
00:44:43,980 --> 00:44:46,319
Associated know that I use protonmail
1111
00:44:46,319 --> 00:44:49,260
protonmail is the only one that I feel
1112
00:44:49,260 --> 00:44:51,420
comfortable with they are based out of
1113
00:44:51,420 --> 00:44:53,940
Switzerland it's end-to-end encryption
1114
00:44:53,940 --> 00:44:55,859
you might ask yourself well what
1115
00:44:55,859 --> 00:44:57,240
difference does it make that they're in
1116
00:44:57,240 --> 00:44:59,579
Switzerland well Swiss the Swiss have
1117
00:44:59,579 --> 00:45:03,180
particular laws that protect people's
1118
00:45:03,180 --> 00:45:07,319
privacy more than even the EU does or
1119
00:45:07,319 --> 00:45:08,940
certainly the US does because the US
1120
00:45:08,940 --> 00:45:10,680
doesn't really have any good privacy
1121
00:45:10,680 --> 00:45:13,319
laws at all Switzerland has long had the
1122
00:45:13,319 --> 00:45:15,599
history that's why there are these Swiss
1123
00:45:15,599 --> 00:45:17,220
bank accounts right because the Swiss
1124
00:45:17,220 --> 00:45:19,440
have special laws of protecting people's
1125
00:45:19,440 --> 00:45:21,839
privacy even if you have end-to-end
1126
00:45:21,839 --> 00:45:24,240
encryption and the encryption in a
1127
00:45:24,240 --> 00:45:27,660
service then if the servers get
1128
00:45:27,660 --> 00:45:30,660
compromised or law enforcement shows up
1129
00:45:30,660 --> 00:45:32,040
that's often what happens law
1130
00:45:32,040 --> 00:45:33,839
enforcement shows up and says we think
1131
00:45:33,839 --> 00:45:36,119
that you know we need to have the data
1132
00:45:36,119 --> 00:45:38,040
from your servers that's how can that's
1133
00:45:38,040 --> 00:45:41,099
less likely to happen in Switzerland
1134
00:45:41,099 --> 00:45:42,780
than it is in other countries it's
1135
00:45:42,780 --> 00:45:44,760
happened in the U.S it's happened in
1136
00:45:44,760 --> 00:45:46,859
Germany it's happened in Australia where
1137
00:45:46,859 --> 00:45:49,500
law enforcement shows up and wants the
1138
00:45:49,500 --> 00:45:52,079
once the records Canada where law
1139
00:45:52,079 --> 00:45:53,640
enforcement shows we want the records
1140
00:45:53,640 --> 00:45:56,579
and therefore that all of your email and
1141
00:45:56,579 --> 00:45:58,980
all of your communication is then
1142
00:45:58,980 --> 00:46:02,460
compromised Switzerland has laws that
1143
00:46:02,460 --> 00:46:04,980
protect privacy that's more strict than
1144
00:46:04,980 --> 00:46:08,099
other nations do and proton male I've
1145
00:46:08,099 --> 00:46:09,900
been using them for I don't know almost
1146
00:46:09,900 --> 00:46:11,880
I actually got one of the beta Accounts
1147
00:46:11,880 --> 00:46:14,220
at protonmail when they first opened up
1148
00:46:14,220 --> 00:46:16,980
you had to actually ask for an account
1149
00:46:16,980 --> 00:46:18,660
um and you had to wait like three or
1150
00:46:18,660 --> 00:46:20,579
four months to get an account so I've
1151
00:46:20,579 --> 00:46:22,619
been with them a long time and I have a
1152
00:46:22,619 --> 00:46:24,780
lot of confidence that that they're
1153
00:46:24,780 --> 00:46:26,400
going they're going to do as good a job
1154
00:46:26,400 --> 00:46:29,700
as possible to protect my information uh
1155
00:46:29,700 --> 00:46:31,200
there's a number of others that are out
1156
00:46:31,200 --> 00:46:32,819
there as well including male fans
1157
00:46:32,819 --> 00:46:35,400
private mail a non-atti Google mail
1158
00:46:35,400 --> 00:46:37,920
secure mail what have you uh those are
1159
00:46:37,920 --> 00:46:40,619
all out there as well as far as secure
1160
00:46:40,619 --> 00:46:43,140
operating systems some of the hardened
1161
00:46:43,140 --> 00:46:46,380
operating systems and cubes sub graph
1162
00:46:46,380 --> 00:46:50,400
hardened BSD are all good choices you
1163
00:46:50,400 --> 00:46:52,560
want to hardened and safe and secure
1164
00:46:52,560 --> 00:46:54,599
operating system one of the things I do
1165
00:46:54,599 --> 00:46:57,060
want to mention before we finish here
1166
00:46:57,060 --> 00:46:59,339
and that is that a lot of people believe
1167
00:46:59,339 --> 00:47:01,500
that making trans transactions in
1168
00:47:01,500 --> 00:47:05,099
Bitcoin is untraceable and that's not
1169
00:47:05,099 --> 00:47:07,319
true all right as a matter of fact I
1170
00:47:07,319 --> 00:47:09,359
have a class coming up I think it's in
1171
00:47:09,359 --> 00:47:12,060
December on how to trace Bitcoin if
1172
00:47:12,060 --> 00:47:14,280
you're trying to remain anonymous and
1173
00:47:14,280 --> 00:47:17,040
you're using Bitcoin Bitcoin is
1174
00:47:17,040 --> 00:47:19,319
traceable it's not easy to trace but it
1175
00:47:19,319 --> 00:47:21,300
can be traced so it's not going to
1176
00:47:21,300 --> 00:47:23,220
maintain your anonymity but also
1177
00:47:23,220 --> 00:47:26,220
remember that maintaining anonymity is a
1178
00:47:26,220 --> 00:47:27,839
matter of throwing up a lot of
1179
00:47:27,839 --> 00:47:30,000
roadblocks to the people trying to trace
1180
00:47:30,000 --> 00:47:31,980
you so the more roadblocks that you can
1181
00:47:31,980 --> 00:47:34,260
put up then the harder it is situation
1182
00:47:34,260 --> 00:47:37,560
but Bitcoin a lot of people believe that
1183
00:47:37,560 --> 00:47:38,880
they can simply purchase them with
1184
00:47:38,880 --> 00:47:41,760
Bitcoin and be safe now some of the
1185
00:47:41,760 --> 00:47:42,619
other
1186
00:47:42,619 --> 00:47:45,180
cryptocurrencies have better anonymity
1187
00:47:45,180 --> 00:47:47,579
that Bitcoin does so and that's one of
1188
00:47:47,579 --> 00:47:48,540
the things that I think we're going to
1189
00:47:48,540 --> 00:47:50,220
talk about in the future that'd be great
1190
00:47:50,220 --> 00:47:52,500
I could do a video on that and everyone
1191
00:47:52,500 --> 00:47:53,640
is watching please put in the comments
1192
00:47:53,640 --> 00:47:55,440
below would you like to see a video on
1193
00:47:55,440 --> 00:47:57,660
occupy the web showing us how to trace
1194
00:47:57,660 --> 00:47:59,700
Bitcoin transactions one other thing we
1195
00:47:59,700 --> 00:48:02,579
want to talk about is anti-forensics I
1196
00:48:02,579 --> 00:48:04,380
have a class coming up this summer on
1197
00:48:04,380 --> 00:48:06,420
anti-forensics first of all I recommend
1198
00:48:06,420 --> 00:48:08,040
that you want to remain anonymous that
1199
00:48:08,040 --> 00:48:10,920
you study forensics and Os in but after
1200
00:48:10,920 --> 00:48:13,619
you've studied it then you have to focus
1201
00:48:13,619 --> 00:48:17,220
on how can I keep the information off my
1202
00:48:17,220 --> 00:48:19,800
machine this includes cleaning off any
1203
00:48:19,800 --> 00:48:22,800
files off your system as we know that if
1204
00:48:22,800 --> 00:48:25,319
you delete a file out of your system it
1205
00:48:25,319 --> 00:48:28,020
still is there so you have to overwrite
1206
00:48:28,020 --> 00:48:30,839
files on your system and then of course
1207
00:48:30,839 --> 00:48:32,880
you want to clean your bash history or
1208
00:48:32,880 --> 00:48:34,859
wherever you're entering your commands
1209
00:48:34,859 --> 00:48:36,960
what would you say to people who say
1210
00:48:36,960 --> 00:48:39,060
that the only way to do operating
1211
00:48:39,060 --> 00:48:41,640
systems is to run it in Ram so you boot
1212
00:48:41,640 --> 00:48:43,920
off a USB or something and it's all in
1213
00:48:43,920 --> 00:48:45,960
Ram and then when you finish you pull
1214
00:48:45,960 --> 00:48:47,640
that out and it's all gone well I think
1215
00:48:47,640 --> 00:48:49,980
that's a really good idea that's that's
1216
00:48:49,980 --> 00:48:52,020
certainly an option is to Simply run
1217
00:48:52,020 --> 00:48:54,119
your operating system all in Ram say off
1218
00:48:54,119 --> 00:48:57,000
a flash drive and then once you've taken
1219
00:48:57,000 --> 00:48:59,880
the flash drive off it means is gone I
1220
00:48:59,880 --> 00:49:03,359
mean it is still possible but if you
1221
00:49:03,359 --> 00:49:05,760
reboot the system everything is gone and
1222
00:49:05,760 --> 00:49:07,859
nearly everything's gone from Ram okay
1223
00:49:07,859 --> 00:49:10,920
there's still forensic investigators can
1224
00:49:10,920 --> 00:49:12,300
still pull
1225
00:49:12,300 --> 00:49:15,480
some information from Ram even after
1226
00:49:15,480 --> 00:49:17,700
you've rebooted the system remember also
1227
00:49:17,700 --> 00:49:21,359
that operating systems when the ram is
1228
00:49:21,359 --> 00:49:23,579
full it begins to write to the hard
1229
00:49:23,579 --> 00:49:26,880
drive right there's swap files so the
1230
00:49:26,880 --> 00:49:29,099
strategy is good one but it's not a
1231
00:49:29,099 --> 00:49:31,800
hundred percent that's my point none of
1232
00:49:31,800 --> 00:49:34,020
these strategies is 100 but if you put
1233
00:49:34,020 --> 00:49:36,359
up enough of these on anonymity
1234
00:49:36,359 --> 00:49:38,700
strategies the safer you're going to be
1235
00:49:38,700 --> 00:49:40,619
we spoke about like buying a separate
1236
00:49:40,619 --> 00:49:42,599
laptop or something for running Linux on
1237
00:49:42,599 --> 00:49:45,119
but you could perhaps boot into RAM on
1238
00:49:45,119 --> 00:49:46,980
that laptop if you just want to you go
1239
00:49:46,980 --> 00:49:48,240
to the next level so it's just like
1240
00:49:48,240 --> 00:49:50,099
layers and layers and layers of right
1241
00:49:50,099 --> 00:49:52,740
anonymity right yeah the more layers you
1242
00:49:52,740 --> 00:49:56,160
put in okay the safer you are my thing
1243
00:49:56,160 --> 00:49:58,500
that I emphasize to nearly everybody is
1244
00:49:58,500 --> 00:50:01,619
that if somebody with enough skills and
1245
00:50:01,619 --> 00:50:03,900
enough knowledge and enough resources
1246
00:50:03,900 --> 00:50:06,359
wants to find you they can't but it's
1247
00:50:06,359 --> 00:50:08,760
that's key enough resources enough time
1248
00:50:08,760 --> 00:50:11,640
and enough skills they can find you but
1249
00:50:11,640 --> 00:50:14,339
most people don't have unlimited
1250
00:50:14,339 --> 00:50:16,560
resources unlimited time and unlimited
1251
00:50:16,560 --> 00:50:19,020
skills what you want to do is to make it
1252
00:50:19,020 --> 00:50:21,359
as difficult as possible but if you
1253
00:50:21,359 --> 00:50:24,420
really need to remain anonymous from say
1254
00:50:24,420 --> 00:50:26,460
the intelligence agencies that's a
1255
00:50:26,460 --> 00:50:28,560
really really difficult job if you want
1256
00:50:28,560 --> 00:50:30,900
to remain anonymous from the commercial
1257
00:50:30,900 --> 00:50:33,599
interests or your next door neighbor
1258
00:50:33,599 --> 00:50:36,000
that's a little bit easier to do than it
1259
00:50:36,000 --> 00:50:38,099
is from the intelligence agency they
1260
00:50:38,099 --> 00:50:40,319
have a huge amount of resources and high
1261
00:50:40,319 --> 00:50:41,819
level skill okay by the way we have
1262
00:50:41,819 --> 00:50:43,260
another one that comes up a lot search
1263
00:50:43,260 --> 00:50:44,400
engines
1264
00:50:44,400 --> 00:50:46,920
um Google's tracking you like crazy
1265
00:50:46,920 --> 00:50:48,480
um what about DuckDuckGo some people say
1266
00:50:48,480 --> 00:50:49,740
bad things about them do you have any
1267
00:50:49,740 --> 00:50:52,559
favorite um search engines what I what I
1268
00:50:52,559 --> 00:50:57,359
would prefer okay is to use Dr go in
1269
00:50:57,359 --> 00:51:00,059
Brave all right the brave browser Google
1270
00:51:00,059 --> 00:51:03,059
is probably the worst in terms of
1271
00:51:03,059 --> 00:51:05,700
tracking your information uh so the
1272
00:51:05,700 --> 00:51:07,319
Google Chrome is a great browser I love
1273
00:51:07,319 --> 00:51:09,359
Google Chrome but they trace they track
1274
00:51:09,359 --> 00:51:11,460
everything that you're doing so I would
1275
00:51:11,460 --> 00:51:15,660
recommend using DuckDuckGo in Brave uh
1276
00:51:15,660 --> 00:51:18,300
to remain safest to have least amount of
1277
00:51:18,300 --> 00:51:20,220
information that's but once again
1278
00:51:20,220 --> 00:51:22,740
remember that even then you want to be
1279
00:51:22,740 --> 00:51:25,440
able to have two separate identities so
1280
00:51:25,440 --> 00:51:28,020
that what you're searching for induct.go
1281
00:51:28,020 --> 00:51:29,760
is different than what you're searching
1282
00:51:29,760 --> 00:51:32,940
for in Google or other places so the two
1283
00:51:32,940 --> 00:51:34,800
cannot be connected I love what you said
1284
00:51:34,800 --> 00:51:37,140
here because in this interview you kind
1285
00:51:37,140 --> 00:51:39,000
of like make taking putting emphasis on
1286
00:51:39,000 --> 00:51:40,740
have different identities like have
1287
00:51:40,740 --> 00:51:42,900
everything separated a lot of people I
1288
00:51:42,900 --> 00:51:44,579
think make the mistake that they use the
1289
00:51:44,579 --> 00:51:47,579
same devices or go to the same websites
1290
00:51:47,579 --> 00:51:49,440
when when they're trying to be anonymous
1291
00:51:49,440 --> 00:51:50,700
and when they're just normally surfing
1292
00:51:50,700 --> 00:51:52,140
and I'm glad that you've really
1293
00:51:52,140 --> 00:51:54,119
highlighted that so a technical solution
1294
00:51:54,119 --> 00:51:56,339
isn't the the answer to everything it's
1295
00:51:56,339 --> 00:51:58,740
like make sure that you separate your
1296
00:51:58,740 --> 00:52:01,680
your behavior if you like exactly and
1297
00:52:01,680 --> 00:52:04,440
and also one of the things that I do is
1298
00:52:04,440 --> 00:52:08,160
put out false information so I I leave
1299
00:52:08,160 --> 00:52:10,619
behind false information that will take
1300
00:52:10,619 --> 00:52:12,420
people to will take people to other
1301
00:52:12,420 --> 00:52:14,460
identities so that when they're trying
1302
00:52:14,460 --> 00:52:16,800
to trace me they all of them are not
1303
00:52:16,800 --> 00:52:18,900
leading to the same identity they're
1304
00:52:18,900 --> 00:52:21,540
leading to multiple identities and and
1305
00:52:21,540 --> 00:52:24,480
that can at least obscure and make it
1306
00:52:24,480 --> 00:52:26,819
more difficult to find you okay by the
1307
00:52:26,819 --> 00:52:28,140
way as always I really want to thank you
1308
00:52:28,140 --> 00:52:29,400
for sharing your knowledge and
1309
00:52:29,400 --> 00:52:30,660
experience with all of us you know
1310
00:52:30,660 --> 00:52:32,099
you've got many many years of experience
1311
00:52:32,099 --> 00:52:34,980
and you have are anonymous online even
1312
00:52:34,980 --> 00:52:37,020
though you've write books you share so
1313
00:52:37,020 --> 00:52:37,800
much information
1314
00:52:37,800 --> 00:52:39,960
so thanks for sharing um your warnings
1315
00:52:39,960 --> 00:52:41,160
and your tips with all of us I really
1316
00:52:41,160 --> 00:52:42,780
appreciate it you're welcome David I
1317
00:52:42,780 --> 00:52:45,059
always enjoy being on your show and look
1318
00:52:45,059 --> 00:52:46,980
forward to doing more of these with you
1319
00:52:46,980 --> 00:52:48,300
on in the future so just for everyone
1320
00:52:48,300 --> 00:52:50,339
who's watching ideas that we've got let
1321
00:52:50,339 --> 00:52:51,780
us know in the comments ideas would
1322
00:52:51,780 --> 00:52:53,220
include Pegasus
1323
00:52:53,220 --> 00:52:55,140
um talking about that uh what other ones
1324
00:52:55,140 --> 00:52:57,119
do we think about with Bitcoin right how
1325
00:52:57,119 --> 00:52:59,400
did trade Bitcoin forensics yeah what
1326
00:52:59,400 --> 00:53:01,020
about like wi-fi hacking that would be a
1327
00:53:01,020 --> 00:53:02,579
good one Bluetooth I think is another
1328
00:53:02,579 --> 00:53:04,380
good one and we definitely want to have
1329
00:53:04,380 --> 00:53:06,420
Mr Robot right and we'll do more with Mr
1330
00:53:06,420 --> 00:53:08,400
Robot as well so for everyone watching
1331
00:53:08,400 --> 00:53:09,900
please put your comments below things
1332
00:53:09,900 --> 00:53:11,220
that you'd like to see occupy by the way
1333
00:53:11,220 --> 00:53:13,200
but thanks so much thanks David see you
1334
00:53:13,200 --> 00:53:15,319
soon
1335
00:53:15,359 --> 00:53:17,480
thank you97308
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.