Go Incognito: A Guide to Security, Privacy & Anonymity | Front to Back
Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey.
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
Thanks for watching the free version of the course - Go Incognito Premium has no ads, includes quizzes & guides, hundreds of improvements, a certificate, and much more! Support our mission & join the premium experience: https://techlore.teachable.com/p/go-incognito
To access the sources, changelog, GitHub repo, and more, visit Go Incognito's Homepage: https://techlore.tech/goincognito.html
Help us spread privacy to the masses! 💜
Patreon: https://patreon.com/techlore
YouTube Supporters: https://www.youtube.com/channel/UCs6KfncB4OV6Vug4o_bzijg/join
Ko-fi: https://ko-fi.com/techlore
PayPal: https://www.paypal.com/donate?hosted_button_id=B3GU7WNGBGQ4J
All Support Methods: https://techlore.tech/support.html
0:00:00 1.1 - Welcome! First Words...
0:04:32 1.2 - Why Should You Care?
0:13:02 1.3 - Security vs Privacy
0:17:24 1.4 - FOSS
0:21:33 1.5 - Metadata
0:27:10 1.6 - The Convenience Line
0:31:07 1.7 - Supporting Go Incognito
0:33:42 2.1 - Section 2 Introduction
0:35:07 2.2 - Minimalism
0:43:10 2.3 - Erasing Your Local Identity
0:49:34 2.4 - Erasing Your Online Identity
1:01:08 2.5 - Section 2 Finale
1:02:09 3.1 - Section 3 Introduction
1:03:45 3.2 - Stay Updated
1:07:45 3.3 - Permissions & Settings
1:13:33 3.4 - Passwords
1:27:20 3.5 - Two-Factor Authentication
1:34:01 3.6 - Search Engines
1:38:27 3.7 - Your Browser
1:42:53 3.8 - Hardening Your Browser
1:50:16 3.9 - Your Browsing Habits
1:55:33 3.10 - Browser Uniquness
1:59:56 3.11 - Proxies & VPNs
2:08:13 3.12 - Antiviruses & Malware
2:15:19 3.13 - File Deletion
2:19:12 3.14 - Storage & Encryption
2:24:45 3.15 - Safe Communication
2:33:21 3.16 - Section 3 Finale
2:35:05 4.1 - Section 4 Introduction
2:36:32 4.2 - Desktop Operating Systems
2:42:33 4.3 - Mobile Operating Systems
2:50:19 4.4 - Expendable Operating Systems
2:55:09 4.5 - Tor
3:01:57 4.6 - Cryptocurrencies
3:06:47 4.7 - Audits
3:11:32 4.8 - Section 4 Finale
3:12:40 5.1 - Section 5 Introduction
3:13:58 5.2 - The Basics
3:21:26 5.3 - MAC
3:24:57 5.4 - Networking
3:29:56 5.5 - Radios
3:38:41 5.6 - Device Separation
3:42:30 5.7 - Section 5 Finale
3:44:01 6.1 - Section 6 Introduction
3:44:58 6.2 - Who Can You Trust?
3:50:56 6.3 - Minimizing Data Access
3:59:09 6.4 - Anonymization & Pseudonymization
4:04:02 6.5 - Shopping Safely
4:09:01 6.6 - Lifestyle Changes
4:14:31 6.7 - Pre-configured Hardware & Software
4:17:47 6.8 - Downsides to Safety
4:21:04 6.9 - Becoming an Activist
4:26:04 6.10 - Section 6 Finale
4:26:55 7.1 - Course Summary
4:29:55 7.2 - Congratulations!
🔐 Techlore Website: https://techlore.tech
🕵 Go Incognito Course: https://techlore.tech/goincognito.html
🎧 Surveillance Report Podcast: https://techlore.tech/sr.html
📹 Odysee: https://odysee.com/@techlore:3
📹 PeerTube: https://tube.privacytools.io/accounts/techlore/video-channels
Support our mission to spread privacy to the masses:
👕 Privacy Shop: https://teespring.com/stores/techlore-merch
🧡 Patreon: https://www.patreon.com/techlore
💛 Amazon Support Page & Recommended Products: https://www.amazon.com/shop/influencer20170928875
💖 All Other Support Methods (PayPal, Monero, etc.): https://techlore.tech/support.html
Connect with our communities:
🐦 Twitter: https://twitter.com/techloreistaken
👾 Discord: https://discord.gg/Xd7baMSpqS
Ⓜ️ Matrix: https://matrix.to/#/#techlore:matrix.org
#goincognito #techlore #privacy
Видео Go Incognito: A Guide to Security, Privacy & Anonymity | Front to Back канала Techlore
Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.
Thanks for watching the free version of the course - Go Incognito Premium has no ads, includes quizzes & guides, hundreds of improvements, a certificate, and much more! Support our mission & join the premium experience: https://techlore.teachable.com/p/go-incognito
To access the sources, changelog, GitHub repo, and more, visit Go Incognito's Homepage: https://techlore.tech/goincognito.html
Help us spread privacy to the masses! 💜
Patreon: https://patreon.com/techlore
YouTube Supporters: https://www.youtube.com/channel/UCs6KfncB4OV6Vug4o_bzijg/join
Ko-fi: https://ko-fi.com/techlore
PayPal: https://www.paypal.com/donate?hosted_button_id=B3GU7WNGBGQ4J
All Support Methods: https://techlore.tech/support.html
0:00:00 1.1 - Welcome! First Words...
0:04:32 1.2 - Why Should You Care?
0:13:02 1.3 - Security vs Privacy
0:17:24 1.4 - FOSS
0:21:33 1.5 - Metadata
0:27:10 1.6 - The Convenience Line
0:31:07 1.7 - Supporting Go Incognito
0:33:42 2.1 - Section 2 Introduction
0:35:07 2.2 - Minimalism
0:43:10 2.3 - Erasing Your Local Identity
0:49:34 2.4 - Erasing Your Online Identity
1:01:08 2.5 - Section 2 Finale
1:02:09 3.1 - Section 3 Introduction
1:03:45 3.2 - Stay Updated
1:07:45 3.3 - Permissions & Settings
1:13:33 3.4 - Passwords
1:27:20 3.5 - Two-Factor Authentication
1:34:01 3.6 - Search Engines
1:38:27 3.7 - Your Browser
1:42:53 3.8 - Hardening Your Browser
1:50:16 3.9 - Your Browsing Habits
1:55:33 3.10 - Browser Uniquness
1:59:56 3.11 - Proxies & VPNs
2:08:13 3.12 - Antiviruses & Malware
2:15:19 3.13 - File Deletion
2:19:12 3.14 - Storage & Encryption
2:24:45 3.15 - Safe Communication
2:33:21 3.16 - Section 3 Finale
2:35:05 4.1 - Section 4 Introduction
2:36:32 4.2 - Desktop Operating Systems
2:42:33 4.3 - Mobile Operating Systems
2:50:19 4.4 - Expendable Operating Systems
2:55:09 4.5 - Tor
3:01:57 4.6 - Cryptocurrencies
3:06:47 4.7 - Audits
3:11:32 4.8 - Section 4 Finale
3:12:40 5.1 - Section 5 Introduction
3:13:58 5.2 - The Basics
3:21:26 5.3 - MAC
3:24:57 5.4 - Networking
3:29:56 5.5 - Radios
3:38:41 5.6 - Device Separation
3:42:30 5.7 - Section 5 Finale
3:44:01 6.1 - Section 6 Introduction
3:44:58 6.2 - Who Can You Trust?
3:50:56 6.3 - Minimizing Data Access
3:59:09 6.4 - Anonymization & Pseudonymization
4:04:02 6.5 - Shopping Safely
4:09:01 6.6 - Lifestyle Changes
4:14:31 6.7 - Pre-configured Hardware & Software
4:17:47 6.8 - Downsides to Safety
4:21:04 6.9 - Becoming an Activist
4:26:04 6.10 - Section 6 Finale
4:26:55 7.1 - Course Summary
4:29:55 7.2 - Congratulations!
🔐 Techlore Website: https://techlore.tech
🕵 Go Incognito Course: https://techlore.tech/goincognito.html
🎧 Surveillance Report Podcast: https://techlore.tech/sr.html
📹 Odysee: https://odysee.com/@techlore:3
📹 PeerTube: https://tube.privacytools.io/accounts/techlore/video-channels
Support our mission to spread privacy to the masses:
👕 Privacy Shop: https://teespring.com/stores/techlore-merch
🧡 Patreon: https://www.patreon.com/techlore
💛 Amazon Support Page & Recommended Products: https://www.amazon.com/shop/influencer20170928875
💖 All Other Support Methods (PayPal, Monero, etc.): https://techlore.tech/support.html
Connect with our communities:
🐦 Twitter: https://twitter.com/techloreistaken
👾 Discord: https://discord.gg/Xd7baMSpqS
Ⓜ️ Matrix: https://matrix.to/#/#techlore:matrix.org
#goincognito #techlore #privacy
Видео Go Incognito: A Guide to Security, Privacy & Anonymity | Front to Back канала Techlore
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала