@techlore

Hello privacy advocates! Thank you for watching this guide and thanks to everyone who helped make it happen šŸ’™
Please support our work and receive exclusive perks, join our Patreon: https://patreon.com/techlore

We got an online quiz for the PDF!: https://techlore.tech/spa
For the checklist scoring PDF: https://github.com/techlore/channel-content/blob/master/Resources/BA2020PDF.pdf
For the video resources: https://github.com/techlore/channel-content/blob/master/Resources/BA2020sources.md
For a more thorough version of this guide, checkout Go Incognito, our free course: https://techlore.tech/goincognito

Seriously everybody, don't forget to normalize privacy! To help us spread our message: Please like, subscribe, share our video everywhere you can, and join our communities! Stay safe out there šŸ•µļøā€ā™‚ļø

@Archangel0804

"Arguing that you don't care about the right to privacy because you 
have nothing to hide is no different than saying you don't care about 
free speech because you have nothing to say"
-Edward Snowden

@nityodayt

Zone 5: Leave everything and go to mountains, stay alone, don't speak anything because birds don't have end to end encryption.

@divyansh2890

Zone 6: visit everyone whom youve ever conversated with, and neutralize them

@LoboLakerGaming

I started doing all the green and a couple of the yellow items nearly 2 months ago, and while I know I’m still incredibly easy to find digitally, the fact my targeted ads either make no sense or are stuck from two months ago shows something is working

@_timestamp

ZONE 1
1:30 password
3:00 two factor authentication
3:40 digital footprint part 1
4:35 social media part 1
5:00 virtual private network
5:45 communication
6:40 browsers part 1
7:20 smartphones part 1
8:25 computer part 1
8:50 storage part 1
9:50 real world part 1

ZONE 2
10:50 password part 2
11:05 digital footprint part 2
12:25 social media part 2
13:10 browsers part 2
14:05 FOSS free and open source software
14:50 smartphones part 2
16:30 cumputers part 2
17:45 storage part 2
18:25 real world part 2

ZONE 3
19:30 digital footprint part 3
19:50 social media part 3
20:10 browsers part 3
22:10 smartphones part 3
22:55 computers part 3
24:05 anonymous shopping
25:15 real world part 3

@redeyesdrogon786

This is an important video. The first one was huge. And this one is going to be even bigger! Love the work you do for us

@carterjunior9701

Big tech enthusiast here, i realized last year how my use of it could be enhanced. I'm really happy to see that I was doing what you said in this video before seeing it. I will definitely take a look at you channel ~

@TIOLIOfficial

A smart man needs only one example to realize something, a confused man eill need one example to get interested, but a fool will not even listen to your examples and continues believing what they already do. This is how almost all people think when they say "I have nothing to hide"...

@beksultanmamytaev1546

You know what? I love your videos (not channel yet, cuz I'm new to it).

Great Edit, understandable language (for basic users like me and also for people, who is studying/learning English)

But most importantly - I love the fact that you put all the needed links and also make the PDF documents so that all the information doesn't look "too much".

Thanks for such a well done work!

@ezekieloruven

Keep in mind: almost every single surveillance camera you can buy is a security nightmare. To start, just never use any "security" camera that defaults to uploading to the cloud, like Nest, Ring, Blink, Wyze or similar. These will keep your surveillance footage without your consent unencrypted indefinitely, and they almost always have absolutely terrible security against being hacked. So many insecurity cameras are used in botnets and found on websites that it is sickening. Cameras are some of the worst offenders in IoT insecurity.

Cameras that use local storage or a local network NVR are better, but the security on NVRs is also terrible and I can't think of a manufacturer I actually trust so... either keep your surveillance on an air-gapped network or maybe just make your own with an RPi?

@mckinleyp

Wow, this video is very well put together. I love how you've separated into 3 zones too. As an experienced techie, I loved that I was able to skip the basics. Thanks guys!

@FlamingBlade5723

You're the best Techlore!! So happy you updated this vid :)

@shivashakti4261

May your team be blessed for all of your hardwork!

@CyberDocUSA

Or we can all get offline, go snatch some land, build a farm and family and live happily ever after.  🤪

@drrenard1277

Hiya! I've actually started to become more security aware. 3 years ago I've started using different passwords and now I am a hybrid of zone 1 and 2 with a touch of 3. I cannot really go completely anonymous as I need to have a public front but elsewise I use many pseudonyms. Half a year ago I completely wiped my Facebook account and I am currently moving away from Google. Always good to have some guidelines though that fills in what I am not doing right.

@NarlaScott

Thanks

@IAmLioNem

Great video, this pdf is really nice and is a great roadmap to become anonymous. I'll print it and pin it on the wall next my desk. I'm on the way to be Techlore approved šŸ‘ŒI'm really waiting for the calyxos review tho :)

@Jryoung-d1y

alright thanks i was unconsiouslly doing most of this but thanks for the password manager tip is really gonna help in the future

@ZGFyZG8g

Thank you for teaching me on privacy and why it matters and how to be private love the channel keep up the great work