Our privacy has been gone for quite a long time. My grandfather was a bootlegger and they used carrier pigeons or in person communications back in the day, we may have to to go back to those similar technologies.
TLS is broken and quantum computers will soon decrypt traditional security tools. Sophisticated hackers and nation-states are looking to log your traffic right now. How? By exploiting the known vulnerabilities of TLS. They'll store that traffic until quantum computers allow them to decrypt your information which is right around the corner this year@!
I was thinking that, but the more I realize it's not any different than what we did 15-20 years ago. We have to think of how we did things back then and from there think about what's available. It seems that once those habbits are there it shouldn't be too bad.
Once you understand how privacy in the digital world works, you know what to do and what not to do. It's really not as hard as it might seem to be. There are a few rules that you need to go by and apply to what you do on the internet (or anywhere else for that matter). Most people give up not because it's that hard, but because they were conditioned to be lazy and were falsely told that if they are not criminals then they don't need privacy (which is not true of course).
@@annihilator9075 If you're thinking of Lavabit, that company was built on a fundamentally weak security architecture that had a single point of failure: there was only one encryption key, which was used to secure every user's e-mails. When the U.S. government demanded access to said key, it would've compromised the security of every Lavabit user, not just the ones being targeted by the govt.'s investigation. Most other encrypted e-mail services use a different set of keys for each user, thus eliminating that single point of failure.
I know he doesn’t like to talk about politics specifically, but I’ve been thinking about getting in touch with him on Brax.me about mentioning this. One of his previous videos not to long ago talked about a UK company doing all this research on what people are looking at on the web, mostly with a ‘far-right’ slant, and Canada was in there. We are the only western nation considering a China-style Great Wall of internet censorship. Bill C-10 if passed is the beginning of the end…
If services such as protonmail become widespread, then, they're no longer "you've got something to hide" email. They're "email everyone uses, because privacy is just common sense."
7 dislikes? I guess there are 7 individuals that apparently don't like "Knowledge". Amazing. Thank you Rob for educating us on these privacy concerns.👍
1:14 start: Gmail 🤣 2:21 old protocols 3:14 email server 3:50 encryption and metadata 5:15 MTA and SMTP 6:15 Snowden 7:18 STARTTLS 9:04 #1 Hide your IP address 9:55 #2 Segregate your email 11:08 #3 Limited use of real name email 11:59 #4 Don’t use Job email for personale use 12:45 #5 State Players 13:23 #6 Set up your own email server 14:18 #7 Use alternatives to email 15:24 #8 Download email and POP3 16:28 #9 No contact list 17:46 #10 No phone number for 2Fa 18:47 #11 19:18 #12 Dont trust Encrypted services 20:51 #13 Gmail for throw away email only
Dear Mr Braxman, Thank you so much for your 15 e-mail tips, they were really good, but however people like us can forget some of them. So please put these tips in writing so we can download them and refer to them for our remembrance. Thank you and all the best for all your future videos. ...... Sunny.
If only we would stop thinking "free = free" and realize that it is always a trade, albeit a hidden one, we'd be much slower to grab whatever is free and sometimes, just cheaper. Would you be willing to pay for an email account, monthly? You see, servers, software, maintenance and data cost money, that has got to be covered somehow. No email is "free", there is no such thing as "free space", somebody HAS TO pay for it. And it's you, and the way you pay is buried in and derived from 1500 page long Terms and Conditions that no user in the entire history of computers has ever read. Now sometimes, this can be pretty innocent, just a ton of ads, that's how it started. Now give that situation 30 years and a million of brainstorm sessions all around the globe by money-hungry companies and career hungry individuals and try to begin to understand they have by now exploited every smallest nook and cranny that is not very clearly illegal. And we can not grasp it, because it's too complex and we're busy... living.
In many states, voter registration forms, mailed ballots, motor vehicle departments and state web contact forms all ask for your email contact address. And they sell it, along with all of your information.
Rob you bring a very rational and down to earth explanations to a very complex subject. Thanks for this. How would you reverse years of being integrated into gmail and other "free" platforms with all this new knowledge?
Hey Rob just thought I would mention that after finding by accident that Aol had taken a voice print of ME with out consent I sent a letter asking for an explanation,,,They replied they had sent my request up to another office and would get back to me....This is not the first time a company has done this to me and never have they been able to provide me with a law or statute that allows them to legally do such a thing,,,,,,,,,Take Care,,,,,,,,Douglas
I've been trying so hard to understand how to make myself safer. Sadly, I have concluded it's not possible. If we are living in a country and time when we need to be concerned that our thoughts and beliefs are a problem THAT is the true issue. The freedom is already lost and no amount of cyber shenanigans will change that.
How do I start from scratch? This is what I'm thinking: 1. get a degoogled phone 2. new linux computer 3. all new emails, following tips from this video 4. all new logins with fake info 5. new phone number 6. Use all the old stuff from above but only for disinformation 7. I need to copy and paste posts to avoid linking me by key stroke trackers 8. Router VPN and TOR browser or brave What did I miss?
Your actions depend on your "threat model." Watch OPSEC subject titles on this channel to plan your escape to more privacy - you've got a GREAT START with a comprehensive list! You're missing "browser isolation," the most simple and free thing to do for starters. Plus, get off Facebook and all Facebook-owned apps. Be sure NOT to download TOR browser until you have a working VPN, you'll get on a "list."
What email should we use for shopping--as it will always reveal our shipping address, partial payment details, and most if not all of our real names? What's the best way to limit this information via email?
So what's the advice if you actually DID use part of your name for your email address? I understand why not to use it, but these email accounts are 15+ years old...not so easy to just stop and switch...anyone gone through the laborious process of switching over to a more securely-named email address? Thanks for the video and information!
@@robbraxmantech Thanks! Sorry, I got a bit anxious with posting a question...posted after only watching half of the video 🤭... I'll finish watching though 🙂
Thanks for the video !!! It was great !! It would be great to show us how you do to make our own email server and most secure and anonymous :)) Keep up the good work !!!
I understand where some people may want to hide their political views shared in emails, perhaps for business purposes. That may be appropriate and is a matter of personal choice. However, we should never have to fear retribution from government for our speech. Consider the price we pay when we begin to censor ourselves.
yes, great point. Unfortunately, corruption doesn't need ethics - it only needs opportunity. This channel points out how the technical opportunities exist, so they are GOING to be used. Gradually is there *is* now retribution and effects from holding certain "opinions" - and it's only a matter of time until "profiling" and categorization WILL be used against people - in fact, this is already happening...and it's frightening!
I used Gmail, creating a new anonymous address, for correspondence concerning a ticket court proceeding. Google, at one point, refused to acknowledge my legitimate password, and I lost access.
whoa... That happened to me. Almost lost a blog I'd been adding to for over ten years. It was only solved by giving them an old burner phone number that I happened to have laying around.
@@mistyculous9644 Good deal. I don't give Google my phone number. They know it is my email, I gave them the correct password. They claimed it was wrong.
BECAUSE CORRUPT GOOGLE WANT U TO GIVE THEM UR INFORMATION WHICH IS NOT RIGHT BECAUSE AFTER U GIVE GOOGLE UR REAL EVERYTHING YOU HAVE NO PRIVACY AFTER THAT.. DID GOOGLE ZACKY ZACKY BURG GAVE US HIS PRIVACY INFORMATION TO US THE CUSTOMERS..NO. BECAUSE HE WOULD GET CURSED OUT TO HIS FACE HOW CORRUPT HE IS WITH OUR INFORMATION THAT HE IS USING FOR FREE. 😄😄😄😄😄 SEE WHAT GOOGLE CEO'S IS DOING TO HUMAN BEINGS.
@@gumby-galbraith641 I am considering going to court and filing a subpoena. My name is all over the court proceedings. I even gave them a valid password. They try to compel you to link it to other accounts.
Dear Rob, Ting has been bought out, your plan that you are on , is NO longer available. $6.00 per device no longer exist, unless you had a previous contract.
After a few paychecks, I'm just getting a new phone. Let the youtube account just live and age in the ethersphere. Stored in a tiny little corner of a server rack. For some future child legend to stumble upon and spark a world Renaissance.
I've been using my own personal name domain name for years (>20), but limited to specific use as mentioned (gov't, bank, family, places with full name already), but I use gmail for generic and never associated name, but now I'm wondering about either. My personal domain has been getting much more spam lately, which it never did, so there is a leak somewhere). I was questioning Google Voice, but now two people have said it's okay. Like my credit card, I wish I could generate virtual/temp phone numbers. Interesting mention of Google Gmail, I've always kept it generic/hidden, but places want it for password, so your mention of stores was good, essentially anything that can triangulate with other info. When will profile photos be a concern? I suspect facial recognition and database linking is already occurring.
So, segregating your emails is good advice, and I do this to a certain extent. However, since most of us haven't been using VPN, and most of us access the various email accounts from the same device and IP address, and the government has access to and stores all that data, then can't the government figure that out that all your email accounts are probably the same person?
my domain provider got hacked, i know coz i started getting spam calls trying to sell me webdesign services for my domain which is supposed to have records protection.
well, in the case of using the phone as 2FA then we have no other option but to use it, we have to use a different line per site to avoid the matching. what other 2FA can be used to avoid this other than phone, with Google services I think we have no other option.
You use Google voice for two-factor authentication? Wouldn't using a Google based product or service expose a person to additional surveillance? I mean, if they track and record everything that we do, then that would link a person to an additional service or otherwise.
I have several domain names with email server service. You say if we are a group that wants privacy and security we can use this if we communicate within the domane? You say this could be safe? For ex unconfortuble journalists that might get some attention from the state. I also remember you having a free email solution?
See on this channel a more recent broadcast when he answers your question, titled: "Using phones with no SIM" ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-qhzU0NHIBrc.html
@@mistyculous9644 Hello, Yes, I have already seen the video you sent me its link (and it is interesting), but I am wondering if it is possible to make any "Virtual Machine" on android or a 2nd user account with limited authority on Android, the same a Windows? At least to defeat the phone from viruses and malware by having, for example, a user with limited account authority or a VM on the phone.
I purged all my emails and put them in folders if I needed them. So last few days I removed about 2000 old emails. I am already getting less spam emails. That is my biggest concern. Junk mail! Even if you unsubscribe it doesnt stop so sending them to spam. Does putting them in folders and off the in ox keep them private?
I have several G mail email accounts, including a gmail for junk, (store coupons and other stuff like that), which I also use for my main RU-vid account creds and which doesn’t have my name on it, apart from where I registered years ago; another gmail account for business, and some spares. My main email account is my old Mac mail, still @mac.com . I’ve been very interested and quite annoyed to find my Mac mail marks my daily Epoch news as junk mail almost every day, and I have to mark them as not junk. It doesn’t do that with much else including junk which I often have to mark as junk. Once a I have marked it as not junk it should stop marking as junk, but it doesn’t. I’m just starting to watch this video as a I write and I’ll be interested to see if and how my mail is filtered by Apple down to my politics!
If using an encrypted service yourself how can you protect mail that is sent to a service that doesn’t use encryption? That has to be the most likely scenario right now,. I can see Amazon, eBay or a mom & pop store moving over to end to end encrypted for us. Is it just keep the email and IP as anonymous as you can?
A VPN helps, but cannot always be working. Using the mail client Thunderbird helps, because it prevents auto-arrival of email when the VPN isn't active...unlike other mail clients. Unfortunately, there's no Thunderbird for phones. So I do not link email to any phone and reserve it for only use with a computer.
Hello Rob ! ...how about if you attach a pdf file to your email...a file that requires a password to open it ? can that also be read from anyone on the way ...? my lawyer does it and say its safer ...but listening to your video here I am not sure anymore.???
Hi Peter - that is a great idea! I cannot answer your Q in relation to 3-letter agencies, but it seems like a perfect solution for general privacy. For instance at work, and an old buddy wants the low-down on your company as he is thinking of applying for a job; or communicating with a lawyer or friends whilst you are going through a bad divorce and you do not want a plain-language record flying about ther internet.
How about writing the e-mail on an offline computer, then archive it with 7z and password-protect the archive, then send it using Thubderbird in Linux? Will that do?