How To Be Anonymous / Invisible Online - protect your privacy & anonymity

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
hello everyone zade from zed security here and in today's video i'm gonna show you how to become fully invisible on the internet now before we get into the video please make sure you smash that like button if you're enjoying my videos this will tell me that you're enjoying my content which will make me make more content it'll also tell youtube that you're enjoying my videos which will make them recommend my videos to more people also i'm giving away free course to one of you guys to enter all you have to do is like the video and subscribe to the channel and we will announce the winner on our social media accounts now let's see how to become anonymous so let's get real it's practically impossible to be fully invisible on the internet by design everything you do gets logged for example let's say you're trying to access a website for example google.com your data passes through a number of hubs it passes through your internet service provider and then it reaches its destination so all of these stops can actually analyze what you do and log what you do and profile you not to mention government agencies and hackers that can actually intercept these connections and intercept your data and again read it log it analyze it and profile you so the goal is usually to protect our privacy and anonymity as much as possible and make it as difficult as possible for other entities to gather information about us and track us and profile us so for the rest of the video i'm going to show you the most important points that you want to keep in mind and the most important things that you need to learn in order to protect your privacy and anonymity now this is a huge topic it is impossible for me to cover it in one video i actually have a full course which is about 11 hours of content to teach you how to protect your privacy anonymity and access the dark web so i'm going to go through the main points in this video if you don't understand anything or you feel like you need to learn more about a specific point then google is your best friend go ahead and do some research on it or if you want you can get my course if you don't want to spend time researching so first of all the main thing that you want to do is make sure that your connection to the internet is private so like i said when you access any websites or do anything on the internet you want to make sure that the data that you send and receive is private doing that is simple enough you can simply use a plugin such as https everywhere this will make sure that all the connections are done over https which means that all of your data is going to be encrypted therefore even though it's going to pass through a number of hops and even though we know that it is possible for government entities and for hackers to intercept these connections they will be able to read our data but our data is going to be encrypted it's going to be gibberish therefore it's going to be useless to them now this will ensure that your connection is private but you're still not anonymous the servers and the websites that you communicate with will still be able to see your location so if you want to protect your anonymity then you should use an anonymizing network a very popular one is the tor network or the onion router tor works by first of all encrypting your traffic and then it randomly selects three nodes or three computers out of the network which contains a lot of computers and then it first passes your data through these three nodes before sending it to the destination now the tor network is free and open for everybody therefore at any point of time lots of people might be using this network and lots of people might be using the three nodes that you are using therefore even if someone manages to compromise this network and analyze what's happening in it it would be very difficult to separate what you do from the traffic generated by all of the other people that are using the same three nodes you can also use a vpn so the vpn again will first add another layer of encryption to your data and it will send it to a middle server that could be anywhere in the world and then from there your data will go to the destination again this adds another layer of encryption and hides your identity and you can even use store and a vpn at the same time for extra protection last but not least is security so even if you're using a great anonymizing network you're bouncing your traffic through a number of servers and you're using all sorts of encryption to protect your privacy if somebody manages to gain access to your computer everything you're doing is useless because they can de-anonymize you very easily therefore if you're serious about protecting your privacy and anonymity it's very important that you use a secure operating system so you should really consider moving away from windows and os x these operating systems are not very secure and they also log a lot of data about you anyway linux would be a great option that balances between security privacy and ease of use but if you really want to protect your privacy and anonymity consider using an operating system that is designed for that purpose such as tails os this is a live and amnesic operating system that you can boot from a usb stick once you reboot it removes everything it routes all traffic through the tor network to protect your privacy and anonymity and it actually comes with a lot of really useful privacy tools if you really want to take your security to the next level then i highly recommend looking up cube's os this is an amazing operating system that is designed from the ground up to be very very secure it separates everything into different domains and everything runs into separate virtual machines that cannot really interfere with each other it has really cool features such as disposable virtual machines to run suspicious files volt machines to store sensitive files linux gateway to route all traffic through the tor network and so much more you should also always be aware and smart with what you do on the internet so it doesn't make sense that you follow everything that i said so far and then you go and log into your gmail or facebook account that already contains all of your information your friends and the previous locations that you used to log into these accounts that'll jeopardize everything so you want to be smart with the services that you use from your email services to instant messaging to search engines pretty much everything you do on the internet you need to think twice about it and try to move to more privacy focused solutions for example instead of using gmail use protonmail or even use a dark web email provider that is more private and more secure i'm only using gmail here as an example but this goes for all of the services that you usually use on the internet so like i said from instant messaging to downloading and uploading and even social networks you want to be very smart with what you do and you should also think twice about the information that you share on the internet think about the people that you communicate with the way you type your emails all of these things can be used as clues and pieced together in order to de-anonymize you like i said it is impossible to be a hundred percent invisible all we're trying to do is protect our privacy and anonymity as much as possible and make it as difficult as possible for others to track us and de-anonymize us it's simply a matter of how much time money and effort they want to invest into tracking you and de-anonymizing you now i hope i didn't miss anything major these are the main points that you want to look for in my opinion like i said use google to learn more about any of these points i'm sorry i couldn't dive too deep into any of them or check out my course if you want to learn more like the video and subscribe to the channel if you want to stay updated with the latest in cyber security and see you in the next video you
Info
Channel: zSecurity
Views: 91,265
Rating: undefined out of 5
Keywords: privacy, anonymity, TAILS OS, TAILS, TOR, TOR Network, VPN, Proton Mail, security, cyber security, zsecurity, zaid sabih, dark net, dark web, darknet, darkweb, deep web, deepweb, whonix, Qubes OS, Linux, TOR Browser, how to be anonymouse, how to be anonymouse on the internet
Id: KUnEZYn9Faw
Channel Id: undefined
Length: 9min 20sec (560 seconds)
Published: Thu Jul 16 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.