MENU

Fun & Interesting

Go Incognito: A Guide to Security, Privacy & Anonymity | Front to Back

Techlore 89,853 4 years ago
Video Not Working? Fix It Now

Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey. Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more. Thanks for watching the free version of the course - Go Incognito Premium has no ads, includes quizzes & guides, hundreds of improvements, a certificate, and much more! Support our mission & join the premium experience: https://techlore.teachable.com/p/go-incognito To access the sources, changelog, GitHub repo, and more, visit Go Incognito's Homepage: https://techlore.tech/goincognito.html Help us spread privacy to the masses! 💜 Patreon: https://patreon.com/techlore All Support Methods: https://techlore.tech/support.html 0:00:00 1.1 - Welcome! First Words... 0:04:32 1.2 - Why Should You Care? 0:13:02 1.3 - Security vs Privacy 0:17:24 1.4 - FOSS 0:21:33 1.5 - Metadata 0:27:10 1.6 - The Convenience Line 0:31:07 1.7 - Supporting Go Incognito 0:33:42 2.1 - Section 2 Introduction 0:35:07 2.2 - Minimalism 0:43:10 2.3 - Erasing Your Local Identity 0:49:34 2.4 - Erasing Your Online Identity 1:01:08 2.5 - Section 2 Finale 1:02:09 3.1 - Section 3 Introduction 1:03:45 3.2 - Stay Updated 1:07:45 3.3 - Permissions & Settings 1:13:33 3.4 - Passwords 1:27:20 3.5 - Two-Factor Authentication 1:34:01 3.6 - Search Engines 1:38:27 3.7 - Your Browser 1:42:53 3.8 - Hardening Your Browser 1:50:16 3.9 - Your Browsing Habits 1:55:33 3.10 - Browser Uniquness 1:59:56 3.11 - Proxies & VPNs 2:08:13 3.12 - Antiviruses & Malware 2:15:19 3.13 - File Deletion 2:19:12 3.14 - Storage & Encryption 2:24:45 3.15 - Safe Communication 2:33:21 3.16 - Section 3 Finale 2:35:05 4.1 - Section 4 Introduction 2:36:32 4.2 - Desktop Operating Systems 2:42:33 4.3 - Mobile Operating Systems 2:50:19 4.4 - Expendable Operating Systems 2:55:09 4.5 - Tor 3:01:57 4.6 - Cryptocurrencies 3:06:47 4.7 - Audits 3:11:32 4.8 - Section 4 Finale 3:12:40 5.1 - Section 5 Introduction 3:13:58 5.2 - The Basics 3:21:26 5.3 - MAC 3:24:57 5.4 - Networking 3:29:56 5.5 - Radios 3:38:41 5.6 - Device Separation 3:42:30 5.7 - Section 5 Finale 3:44:01 6.1 - Section 6 Introduction 3:44:58 6.2 - Who Can You Trust? 3:50:56 6.3 - Minimizing Data Access 3:59:09 6.4 - Anonymization & Pseudonymization 4:04:02 6.5 - Shopping Safely 4:09:01 6.6 - Lifestyle Changes 4:14:31 6.7 - Pre-configured Hardware & Software 4:17:47 6.8 - Downsides to Safety 4:21:04 6.9 - Becoming an Activist 4:26:04 6.10 - Section 6 Finale 4:26:55 7.1 - Course Summary 4:29:55 7.2 - Congratulations! 🔐 Our Website: https://techlore.tech 🕵 Go Incognito Course - to learn about privacy: https://techlore.tech/goincognito 🏫 Techlore Coaching - to get direct support: https://techlore.tech/coaching 💻 Techlore Forum - to connect with other advocates: https://discuss.techlore.tech 🦣 Mastodon - to stay updated: https://social.lol/@techlore We cannot provide our content without our Patrons, huge thanks to: BRIGHTSIDE, Clark, Ente, Larry, Afonso, Boori, Brad, Casper, Cookie, Floyd, JohnnyO, kevin, love your content, NotSure, Poaclu, x 🧡 Join them on Patreon: https://www.patreon.com/techlore 💚 To see our production gear, privacy tools we use, and other affiliates: https://techlore.tech/affiliates 💖 All Techlore Support Methods: https://techlore.tech/support #goincognito #techlore #privacy

Comment