REVEALED! Your Secret Power Over Google

Поділитися
Вставка
  • Опубліковано 30 січ 2024
  • As much as I exposed the intense tracking that Google does, it is pretty easy to defeat if you understand the mechanics of how they track. If you follow these tips, you can ignore things like tracker cookies. Be empowered to protect your privacy by knowing how things work.
    -----------------------------------
    De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on brax.me. Sign in to the platform to see the store. You will not be asked for personal information to sign up.
    -----------------------------------
    Merch Store
    my-store-c37a50.creator-sprin...
    -----------------------------------
    I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.
    I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.
    Support this channel on Patreon! www.patreon.com/user?u=17858353
    Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)
    brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise
    bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing
    whatthezuck.net Cybersecurity Reference
    brax.me Privacy Focused Social Media - Open Source
    Please follow me on
    Odysee
    odysee.com/$/invite/@RobBraxm...
    Rumble
    rumble.com/c/robbraxman
  • Наука та технологія

КОМЕНТАРІ • 405

  • @Good4All4Good
    @Good4All4Good 4 місяці тому +132

    It is because you are "a deep level technologist" that you can explain "the why" of privacy threats. Understanding "the why" helps to learn "the how". Thank you, Rob Braxman!

    • @eli1882
      @eli1882 4 місяці тому

      Cringe

    • @zmartkooky244
      @zmartkooky244 4 місяці тому

      @@eli1882 schizo

    • @scotsmanmike
      @scotsmanmike 4 місяці тому

      @@eli1882thanks! You made me spit out my jam toast & now I’ve got sticky bedsheets

    • @ciskorijken
      @ciskorijken 4 місяці тому

      ELI5 pls ​@@eli1882

    • @phr3ui559
      @phr3ui559 4 місяці тому +1

      yep

  • @VeteranExpat
    @VeteranExpat 4 місяці тому +58

    You are the pre-war John Connor

    • @AF_1892
      @AF_1892 4 місяці тому +5

      I wanna be the girlfriend that gets to go into the bunker w John Conner when Skynet pops off.

    • @Jane.Doe.
      @Jane.Doe. 4 місяці тому +5

      @@AF_1892
      You"d still be zucked.

    • @chrisdoe6890
      @chrisdoe6890 4 місяці тому

      @@Jane.Doe.hey Jane I did a 23& me and I think I’m you’re half brother / sister. If I’m watching Brad you and I both know I’d never do that 😅

  • @user-x-99
    @user-x-99 4 місяці тому +10

    "Ah Grasshopper, focus not on the data being collected, but rather, the identity attached to it, sow the seeds of confusion, so your opponent knows not what you are thinking, then contentment shall be yours"

  • @schweinhund7966
    @schweinhund7966 4 місяці тому +9

    Please continue to explain the “why.” When one understands “why” one can better understand the reasoning and rationale and thereby better mitigate the problem. Keep up the great work.

  • @johnsterling5425
    @johnsterling5425 4 місяці тому +39

    You are right. But we've been trained in a backward way of thinking by our corporate overlords.

    • @terrydaktyllus1320
      @terrydaktyllus1320 4 місяці тому +6

      Critical thinking is an extremely good way of fighting back against poor training.

    • @Randytherumbler
      @Randytherumbler 4 місяці тому

      👍. Yep! And almost all corporate and conglomerate overlords always train,teach,and academically succeed in being complacent in earning as much profit for themselves,and not for their employees.
      And even their employers.
      No matter how far technology becomes,we can *still* be tracked,even with degoogled smartphones.
      When the time finally comes for manufactures to build degoogled smart TVs,will we still be protected from being hacked by Big Tech?
      Probably.
      There will always be legal loopholes within the global economy and its judicial system worldwide,that we'll have to just be more advanced in protecting ourselves.
      And not having to,one day,ever use the dark web by using Tor.

  • @user-sy8wq4kq2y
    @user-sy8wq4kq2y 4 місяці тому +19

    Hi Rob! Eric here from the Gold Coast, Australia. Please keep the detailed explanations of why & how. Don't listen to the simpletons who just want solutions. Its your TRUTH that makes you the best on the planet! You save ppl's lives everyday by protecting them from the Gov when the Gov goes bad. I look forward to every show. Keep up the awesome work! Long live Rob Braxman!

    • @Wasko2
      @Wasko2 4 місяці тому +1

      Couldn't have said it better :)

  • @survivingthetimes
    @survivingthetimes 4 місяці тому +17

    We have a population full of people that are too lazy to learn stuff, so it's no wonder that we have the government that we do.

    • @josefserf1926
      @josefserf1926 4 місяці тому

      Good point. Corruption festers amongst ignorance. Just look at the way the global banking system enslaves us all into debt and servitude.

    • @Randytherumbler
      @Randytherumbler 4 місяці тому

      Or ignorant. There are too many people that are too indoctrinated into believing that Big Tech is looking out and watching over them.
      They're not. And they're not there for you and me. The average hacker doesn't know and realize that any government agency can easily track them down.
      By using BraxVPN, BraxMail,and by using Rob's degoogled smartphones available on Rumbler.
      Not even using the Tor browser and/or network can be total anonymous.

  • @RagnarinVa
    @RagnarinVa 3 місяці тому +2

    I don't care what anyone says - I like your delivery style - I learn more from this approach.

  • @kilcar
    @kilcar 4 місяці тому +9

    You are the Thomas Paine of Technology Rob. Well done! Please keep up the " good fight"!

    • @selfcontrol9982
      @selfcontrol9982 4 місяці тому +1

      Thomas Paine's Common Sense is still relevant today.

  • @William0271
    @William0271 4 місяці тому +20

    Someone needs to remake "Every Breath You Take" from Big Tech's perspective

    • @stevengill1736
      @stevengill1736 4 місяці тому +3

      You know, I think someone did! It's certainly been used in that context. (personally I found that song a little creepy,)
      Cheers...

    • @nahtesalinas1917
      @nahtesalinas1917 4 місяці тому

      People have given up hope.

    • @StoreRunDotCom
      @StoreRunDotCom 4 місяці тому

      checked the lyrics, pretty much needs no editing - maybe an AI mashup lol

  • @teamhaselmyer
    @teamhaselmyer 4 місяці тому +20

    Thanks again for all the valuable information. We appreciated what you do🤟

  • @ruckboger
    @ruckboger 4 місяці тому +8

    You have great content Rob. Thanks for what you do!

  • @kevinpritchard3592
    @kevinpritchard3592 4 місяці тому +9

    I for one appreciate the attention to detail Rob, the one’s that want a simple fix with little effort are well, just one level above sheeple anyway. Thanks for the information

  • @CraftAero
    @CraftAero 4 місяці тому +12

    Taking Rob's advice on "compartmentalization" of browser(s) activity a step further, I added a website blocker extension to each browser.
    Chrome is ONLY allowed to access "google" sites (gmail, youtube, maps, etc.). Any outside links I might click (points of interest) are rejected locally and a warning displayed.
    FF and Brave are NOT allowed access to any google assets (or facebook, linkedin, etc). Same thing, if I inadvertently click a link to any "banned" site, the request is locally re-directed before being sent to the DNS.

    • @RevWillBreeze
      @RevWillBreeze 4 місяці тому

      I like that idea. Which extension are you using?

    • @CraftAero
      @CraftAero 4 місяці тому

      ​@@RevWillBreeze Look up "website blockers" in your favoured browsers extension menu.
      Set Chrome for ONLY "google" websites and any other browsers for NEVER "google" websites.
      It's "belt and suspenders", it but prevents any inadvertent cross-contamination.

    • @Ballr00mBlitz
      @Ballr00mBlitz 4 місяці тому

      Do you think it's better to use multiple Brave profiles so Chrome Is fully avoided? I do that currently, but maybe using chrome for Google only seems better. I still have 2 Google accounts. Chrome will maybe be smart to link them together even by Chrome separate profiles

    • @CraftAero
      @CraftAero 4 місяці тому

      @@Ballr00mBlitz Chrome IS Google.
      I use Vivaldi "as Chrome" for youtube type activities, but for NOTHING else.

    • @Randytherumbler
      @Randytherumbler 4 місяці тому

      What about using degoogled smartphones? Using Rob Braxman Tech's website. Using VPN's,by proxy,and by BraxVPN.
      BraxMail.
      And by not relying on Facebook for anything.
      Avoiding MAGA FX entirely is virtually impossible, without having so many problems being on the computer.
      And/or by any degoogled smartphone.

  • @jyrueta
    @jyrueta 4 місяці тому +12

    Thank you! Keep up the detailed videos.

  • @Bj-en1qx
    @Bj-en1qx 4 місяці тому +3

    I like how you approached this video a bit better than some of your other videos. Your messaging is easier to absorb when you frame it in a manner that doesnt come off as accusatory or blaming people for problems that isnt their fault. I think if you try to frame or structure your message in a way thats more positive and focuses on the way people can be proactive about privacy it will seem less abrasive and people will be more open minded to what your presenting. That is more positive way than pointing out all the ways people are contributing to the problem by just accepting it or not going thru extraordinary effort to avoid data collecting. Its a more agreeable way of presenting information and wont turn people off to a message that has a persecutory tone to it. We all appreciate the info and hard work put into these videos to help educate people in these important issues that affect everyone.

  • @onradioactivewaves
    @onradioactivewaves 4 місяці тому +2

    Thank you Rob, your work is highly appreciated.

  • @mrjr-wp8dx
    @mrjr-wp8dx 4 місяці тому +2

    Rob Braxman articulates his phrases with such intuitive technique he can only be impressive to the smart person watching/listening. Robs multi perspective answers to the same question in reputation should be importantly admired by any teacher and those alike. I am confident when I suggest and share the name Braxman in passing. He has personally responded to my own questions years ago & that was part & partial to solidify the opinion and reviews I make of any content he provides or recommends. I just want to thank you Rob, you dearly add to the better part of my life and those around.

  • @tomad4051
    @tomad4051 4 місяці тому +5

    “Not my style, folks…” sums up, imho, part of the problem. Indicating the “Laziness Factor” of this Day and Age.
    All Worthwhile Endeavors require their DUE EFFORT. 🤔🤔🤔

  • @user-sb3wh3dd4v
    @user-sb3wh3dd4v 4 місяці тому +17

    Rob, like others, I greatly appreciate the time and effort you put inot your educational videos.

    • @Randytherumbler
      @Randytherumbler 4 місяці тому

      And didn't everyone know that DARPA was the government agency that orginally created the internet?
      Back in the '80's, hardly anyone knew that it had meant.
      We had those old-fashioned Apple '80's PC's at our junior high school (now called middle school) .
      And all you saw on those screens was the color green.
      Using those floppy disks.
      Using and pressing those three keys at the same time,starts up the entire computer.
      And dealing with those annoying syntax errors on those nerve-racking situations,all.the.time.

  • @lukasbruderlin2723
    @lukasbruderlin2723 4 місяці тому

    I really like the style of your videos with clear languagex wording and definitions.
    I'd love to have you do a comprehensive video on perfonal / home routers and it's pros and cons of the dirrerent technical solutions - including but not limited to your own router hardware solution - of course with the main focus on privacy (and security).

  • @stizelswik3694
    @stizelswik3694 4 місяці тому +2

    UA-cam, being google, as it is.... I'm surprised they haven't canceled your channel. I'm glad they haven't! Thank you for sharing your tactics with us, google or not.

  • @rightsdontcomewithpermits7073
    @rightsdontcomewithpermits7073 4 місяці тому +5

    Lol, when you coexist with the monster, eventually the monster will get you. 😂

  • @powerdude_dk
    @powerdude_dk 4 місяці тому +1

    thanks Rob. It was straight to the point and explained very clearly.

  • @alanmott-smith9358
    @alanmott-smith9358 4 місяці тому +8

    Thank you again, Rob.

  • @TheMadManPlace
    @TheMadManPlace 4 місяці тому +9

    Ping ANY IP address and at least 1 of the routers in the return will be a router in America OR a router NOT in America BUT monitored by the alphabet agencies.
    ALL American routers are monitored by said alphabet agencies.
    IT IS NOT GOOGLE OR FACEBOOK WE SHOULD BE WORRIED ABOUT BUT RATHER THE ALPHABET AGENCIES.

    • @Plisken65
      @Plisken65 4 місяці тому

      Alphabet agencies created Google.

    • @terrydaktyllus1320
      @terrydaktyllus1320 4 місяці тому

      You can't ping most Internet routers - they're designed to drop ICMP packets as a defence again DDoS attacks.
      I am most worried about people like you spreading FUD because you don't know what you're talking about in the first place.

    • @linsqopiring6816
      @linsqopiring6816 4 місяці тому

      Privacy threats from alphabet agencies make google's threats look easy.

    • @terrydaktyllus1320
      @terrydaktyllus1320 4 місяці тому +1

      @@linsqopiring6816 It depends what your threat model is. I am Europe, not the USA, and given that I a law-abiding citizen, I consider evil corporations to be a far bigger threat to me than government or law enforcement agencies - especially as a registered voter with access to free healthcare and social support, the government already has a lot of my personal information anyway.
      I assume you're in the USA - in which case are you also registered to vote? Because then your government has your personal information anyway, and if you're not registered to vote then how do you ever partake in changing a snooping government anyway?

    • @linsqopiring6816
      @linsqopiring6816 4 місяці тому +1

      @@terrydaktyllus1320The threats from google are much easier to mitigate. That's why Rob can give such powerful and simple advice on it. The government has much more power, for reasons such as you yourself gave about knowing your info from many different databases it has on its citizens. And add to that the type of tools such as revealed by Snowden. Government makes google look easy.

  • @stevejanejamesjassteph5903
    @stevejanejamesjassteph5903 4 місяці тому +2

    Thanx Rob for your clear explanations, greetings from Gold Coast, Australia

  • @humanearthhead
    @humanearthhead 4 місяці тому

    Keep on keeping, it's always an education everytime, thanks!

  • @relaxingnightsounds1489
    @relaxingnightsounds1489 4 місяці тому

    Thnx rob for your work plz continue..your needed

  • @margogreen8619
    @margogreen8619 4 місяці тому

    Thank you for all the fine details, that was very interesting and gave me more insight!

  • @georgevavoulis4758
    @georgevavoulis4758 4 місяці тому +2

    Thank you so much for all this helpful and important information. Please do a video about how good these "security privacy protection services are .Keep up the good work .😊

  • @user-op7gc8si2m
    @user-op7gc8si2m 4 місяці тому

    Ive come across many informative tech specs on privacy. Thank you for being precise and direct. If its your channel that actually gains ground on our tech growth. Will definately share with like minded interest future techies.

  • @TokenTech
    @TokenTech 4 місяці тому +2

    Hey the set looks good! I like this strategy of working with the issues instead of trying to replace it. Most of us have to use Microsoft or google because of work or school but that doesn’t me we have to use it for everything. It really feels like knowledge is power

    • @Randytherumbler
      @Randytherumbler 4 місяці тому

      And as you should know already Microsoft *is* part of ,MAGA FX.
      Needless to say,M - is for Microsoft. A - is for Apple G - is for Google A - is for Amazon. F - is for Facebook. X - is for a social media platform formerly known as Twitter.
      Get a degoogled smartphone from Rob Braxman Tech!

    • @TokenTech
      @TokenTech 4 місяці тому

      @@Randytherumbler personally if I get a degoogled phone, I would prefer to do it myself. I don't really trust anyone anymore, and have moved to self hosting pretty much all of my own services at least the ones that I can. however that being said I would still have to trust the person making the software so idk, might just have to go with a dumb phone

  • @stopcensoringmen5044
    @stopcensoringmen5044 4 місяці тому +1

    Hey, Rob.
    Thank you for making your videos.
    We really appreciate the effort you make and it gives me hope to see people fighting for our rights to privacy.

  • @qdrive978
    @qdrive978 4 місяці тому +14

    Thank you Rob! I have watched for some time and put quite a few things you suggest into practice. The wife does not care about her privacy as she "has nothing to hide". I don't like to be watched and spied on. So I do my best to mitigate my exposure everywhere.

    • @terrydaktyllus1320
      @terrydaktyllus1320 4 місяці тому +6

      Next time you take your wife into a room full of people, ask her if she'd hand you her purse so that you can shout out bank account numbers, credit card numbers, date of birth, name, address and any other personal information that you find in there. I am sure she will quickly reveal that she does has "things to hide", just like we all do.

    • @salvador.garcia
      @salvador.garcia 4 місяці тому +3

      Maybe she thinks you look for privacy because you're cheating on her xD
      Try to show her all the things that there are on your phone and tell her which is which.

    • @qdrive978
      @qdrive978 4 місяці тому

      @@salvador.garcia I have tried to show her "the light" and yet she is "programmed" to think that everything is fine and the government is here to help....

    • @qdrive978
      @qdrive978 4 місяці тому

      @@terrydaktyllus1320 would not that be something. :)

    • @salvador.garcia
      @salvador.garcia 4 місяці тому

      @@qdrive978 Well, that seems like a problem of ethical-political principles. Once she tolerates you (basis of coexistence), try to use another email or email alias and another phone number in your internet interactions with her, so even if she has you in her contacts, the govt. and corporstions can't link you to your other accounts or search story.
      For the rest, if you have children, talk to them, make them see the dangers of deep fakes and other AI images in this era, the rich (the real ones, not celebrities) are increasingly hiding their children from social media.

  • @stevdaughtr6098
    @stevdaughtr6098 4 місяці тому

    The Y of things is so important. Thank you for everything that you do. I think it would be great if you went around the country speaking to high school kids if admin would let you in. Plenty of times I’m confused during explanations, but I’m learning and I appreciate how much you do to help everyone else gain some of your insight because we all need it. Your story is so important to keep telling.

  • @czar4960
    @czar4960 4 місяці тому +5

    Thank you for staying with the accurate and detailed explanation of the "why"......so many people give u half the info....and invariably we end up making a mistake somewhere down the line....
    And that can compromise a long term plan......
    When your busy...getting it right the first time counts
    So
    Thank you Rob
    For being very informative

  • @user-op7gc8si2m
    @user-op7gc8si2m 4 місяці тому +1

    Thank you Rob.

  • @SirPrancelot1
    @SirPrancelot1 4 місяці тому +1

    Thanks Rob.

  • @pauldaystar
    @pauldaystar 4 місяці тому

    Thankyou From Alaska Much Appreciate All your Research🙏🏽👣🕊

  • @pierpi6715
    @pierpi6715 4 місяці тому

    Thank you. Don't give up, we are with you and we need you.

  • @mark1658
    @mark1658 4 місяці тому

    I rarely get the opportunity to watch your content. However, when I do, it's always an eye opening experience. Thank you.

  • @q3c6y67
    @q3c6y67 4 місяці тому

    Thank you for the offer. Please cover topics, smart tv, everyone is identified by internet activity from their residence regardless, and your “logged in” to the isp no matter what your doing and nothing you can do to mitigate tracking with identity.

  • @stevedonovan6442
    @stevedonovan6442 4 місяці тому +1

    Hi Rob, I have a thought/ question on a subject area. Regarding Google tracking ( and others). Where does this tracking stand when the access to the internet is via an Android phone connected to devices that use a VPN, given it should be encrypted from device to VPN server.

  • @imaginemyshock8067
    @imaginemyshock8067 4 місяці тому +1

    I'd be interested in being told about what privacy vulnerabilities exist in relation to the ISP, which knows the identity, and also what sort of privacy tracking government can do, and if anything can be done about any privacy problems these two create. I'm thinking primarily about the vulnerability of the PC, and the phone only secondarily.

  • @eprofessio
    @eprofessio 4 місяці тому +1

    We love you Rob!!

  • @jasonmullinder
    @jasonmullinder 4 місяці тому

    Leaving out the why is like spreading awareness of one specific email scam, knowing helps us anticipate tomorrows threats

  • @iteerrex8166
    @iteerrex8166 4 місяці тому +3

    Mr Braxman, have you made or would you make a video about starting from scratch? What devices and OS to get, like degoogled and Linux, trick and techniques like browser isolation, router issues like VPN, and so on. If you’ve made it but it’s in many videos, would you make a playlist please. Thanks.

    • @ronb6182
      @ronb6182 Місяць тому +1

      That's a good idea. A step by step approach. Like first buy a degoogled phone or make your own. I'm not that advanced. Then comes the VPN router. Common sense would tell you no FB or Instagram or other social media. Have two phones, one for Google and the second for privacy. Keep the Google one off when not needed and take out the sims card. Cage the sneak if you have to. I hope someone would add to this list. 73

    • @iteerrex8166
      @iteerrex8166 Місяць тому

      @@ronb6182 I’m not too advanced with security either, but more and more it looks like we should familiarize ourselves.

    • @iteerrex8166
      @iteerrex8166 Місяць тому

      @@ronb6182 I’m not too advanced with this topic either, but more and more it looks like we should familiarize ourselves.

    • @iteerrex8166
      @iteerrex8166 Місяць тому

      @@ronb6182 Twice I replied to you 🤷‍♂️

  • @aryluizbon6845
    @aryluizbon6845 4 місяці тому +2

    I would like to hear from you about distributed cloud.

  • @UserHandle0702
    @UserHandle0702 4 місяці тому

    Great content !!!

  • @johnwilson-mr6pw
    @johnwilson-mr6pw 4 місяці тому +2

    I view the internet exclusively on my laptop via a tethering method from my Microsoft phone which is ten years old now. How does tethering affect my presence on the net? Does the net (Google) assume I am on my phone or does it know I'm not actually using the phone to brows content?

  • @troywhite6039
    @troywhite6039 2 місяці тому

    The Why helps too understand the tech. Keep doing it your way.

  • @methere27
    @methere27 4 місяці тому +8

    I believe personal computers have become much more determanistic in nature as you give your name and id to purchase them and then sign up for psuedo warranties and updates

    • @terrydaktyllus1320
      @terrydaktyllus1320 4 місяці тому +5

      That may be the case if you run a Windows or Mac OS but if you install Linux on the PC and follow Rob's guidance on browser segregation and multiple identities then you can remain very private.
      For me personally, warranties are not worth the money beyond the usual 12 months you get with any new device (at least where I am in Europe anyway). Within 18 months the value of the hardware has dropped by 90% and because I've been building and repairing computers for many years now, I just fix it myself at that point if it goes wrong.

    • @linsqopiring6816
      @linsqopiring6816 4 місяці тому +3

      Use cash and all fake info! Better yet buy used and they will associate with the wrong person.

    • @terrydaktyllus1320
      @terrydaktyllus1320 4 місяці тому +1

      @@linsqopiring6816 If you run Linux, what information are they associating to you from that PC?
      It's not like a Google Android phone or iPhone that leaks your IMEI number or phone number, both of which are unique to you.
      The only equivalent on a PC is a registration key for Windows or Mac - and if you use that rubbish then that's your problem.

    • @mentecriptica3163
      @mentecriptica3163 4 місяці тому +3

      what you say is not true. Normie phones are much more deterministic because of unique identifiers (imsi, imei, etc)
      If you use websites in a pc, the websites are limited to browser fingerprints and not sensitive identifiers... unless it is a program and not a browser.

    • @linsqopiring6816
      @linsqopiring6816 4 місяці тому

      @@mentecriptica3163 I think he meant compared to how they used to be not compared to smart phones.

  • @exatheist369
    @exatheist369 4 місяці тому

    thank you for your determination!

  • @budd1814
    @budd1814 4 місяці тому +2

    I tell my customers about you and your services

  • @larrymiller9873
    @larrymiller9873 4 місяці тому +1

    Rob I thank you for all your info and pray your knowledge helps as many that want to sit and listen. These people probably have severe ADD or they r part of the problem and troll you. I find it very helpful.
    When I signed up to go to Iraq in 04 as a contractor I had to get 1 of the first IMMUNITY PASSPORTS. And not knowing the full extent until 10 yrs later how I was still being tracked every where I went because of my id that I never threw away when I came back in 06. It just stayed in my wallet next to my TWIC CARD.

    • @linsqopiring6816
      @linsqopiring6816 4 місяці тому +2

      rfid?

    • @larrymiller9873
      @larrymiller9873 4 місяці тому

      @@linsqopiring6816 come to find out it was illegal in the US. It had to be tested in another country like a warzone, it was only funded by Congress for 2yrs.
      It's in the health and human resources report 2006. No names r in it just subjects.

  • @randydell4131
    @randydell4131 4 місяці тому +1

    Wow, great explanation sir....Can you use a de-Googled phone on any carrier, or do you need to use it on a particular carrier? If I get a de-googled phone I suspect I should use a new number, since the # I have been using is tied to me...correct?

    • @robbraxmantech
      @robbraxmantech  4 місяці тому +1

      Depends on the phone model. Pixels work on all networks and all countries. BraX2 phones for example do not work on Verizon.

  • @jimfinigan1779
    @jimfinigan1779 4 місяці тому +1

    I need to be logged into google to use youtube. Could I hook up another computer (with the same internet provider) and use a VPN and Brave without being tracked? Would cookies from other sites still identify me?

  • @jadefinchscene5644
    @jadefinchscene5644 3 місяці тому

    G isnt even sure what language i speak. Using what i have learned from you Rob i now see adverts in several languages, from several regions. And for things i will never be interested in. What you suggest clearly works.

  • @edzanjero353
    @edzanjero353 4 місяці тому +1

    Rob, in your website store, your list of BYOB supported phones includes the Moto G7 series of phones for DeGoogling. Is this still the case for the Motos? I'd their architecture similar to the Pixels?

    • @robbraxmantech
      @robbraxmantech  4 місяці тому +1

      To check current models, please go to LineageOS.org and verify if your device is supported. If it's a Pixel we can do it even to the most current model.

  • @Serendipity_Glows
    @Serendipity_Glows 4 місяці тому

    Dog videos and bathroom repair? 💯 they GOT ME 😂

  • @jonathansalgado9265
    @jonathansalgado9265 4 місяці тому

    Have you done a video discussing eero wireless routers and privacy concerns? Or better yet recommending a decent wireless router?

  • @dunawam
    @dunawam 4 місяці тому +1

    So I'm wondering if one can use a prepaid phone card with these? I mean, all I really want is a phone, and something that I can access the internet on if I want to ..

  • @deltabravo9903
    @deltabravo9903 4 місяці тому

    Thank you

  • @patriotwholesale5258
    @patriotwholesale5258 4 місяці тому +1

    Great video! When you use Brave browser, do you use it with the TOR option all the time?

    • @jamesready5
      @jamesready5 4 місяці тому +2

      He uses, and recommends, a VPN.
      I’ve never used TOR, but I believe the major downside is speed. Along with government controlled exit nodes.

    • @patriotwholesale5258
      @patriotwholesale5258 4 місяці тому

      If you use the Brave browser there is a button to use it with TOR to search if you want.@@jamesready5

    • @robbraxmantech
      @robbraxmantech  4 місяці тому +5

      Many websites reject TOR. So I don't use it except for special "high risk" cases.

    • @lussor1
      @lussor1 3 місяці тому

      If you use tor, there is a browser specialized, not brave

  • @24hmelbournelocksmithdotco6
    @24hmelbournelocksmithdotco6 4 місяці тому +1

    Hi Rob
    If i am obligated by my employer to carry an Iphone 24/7 and only use it for employer stuff, AND i use a DeGoogled phone for my private stuff, wont the fact that i carry the 2 together (via GPS tracking) abrogate my privacy on the DeGoogled phone?
    Thanks for your good work

  • @musiceditor7083
    @musiceditor7083 4 місяці тому +1

    Rob - when you refer to the IMEI tracking when logged into Google on a phone, would that also apply if you were logged into Gmail via Apple Mail? Or is it just when you're logged in on Chrome?
    Can they get the IMEI of your laptop via this method?
    Great videos - they really make you start thinking logically about privacy & connecting all the dots

    • @CraftAero
      @CraftAero 4 місяці тому +1

      If your lap top has no SIM card, it has no IMEI.

    • @robbraxmantech
      @robbraxmantech  4 місяці тому +2

      Google can find alternate identifiers on an iPhone. Doesn't have to be the IMEI. For example, the AppleID.

    • @rfxtuber
      @rfxtuber 4 місяці тому

      ​@@robbraxmantech On the normie side of things ROB, why don't we have any software/browser based tools (PC client Win10,Win11) that could reliably be used to assist or scramble all the multitude of identifiers, including hardware ones, not for any true privacy per se, but to jangle/confuse the information flow so to speak when using normie mode? Like an emulated bridge or something even in normie mode...never trusted but to scramble and confuse....

  • @linsqopiring6816
    @linsqopiring6816 4 місяці тому +2

    Very simple yet powerful techniques! My fear is they will sneakily somehow try to make a link between some of these different access points and determine it's the same person.

    • @robbraxmantech
      @robbraxmantech  4 місяці тому +2

      All probabilistic. Looking for you to make a mistake to make it deterministic. But stick to my advice and the probabilistic will fade away

    • @linsqopiring6816
      @linsqopiring6816 4 місяці тому +1

      @@robbraxmantech/videos
      An interesting point to touch on in another video or live stream might be what use can they make of probabilistic determination. Like for example, the advertising clients still pay them but pay them less since it's probabilistic? Thanks Rob.

  • @pauberrymon5892
    @pauberrymon5892 4 місяці тому

    There is always Hope Mr.Braxman, every hole can be plugged 🙂.
    I thank you for all your information and advice.
    The biggest threats on the web are the 3letter agencies.

  • @bryantvanderson9473
    @bryantvanderson9473 4 місяці тому

    the thing that concerns me is the sim card in the Hotspot. I am still learning whatever I can about all this stuff. Your phones seem to beat Google and I am not sure about the baseband and sim card communication that is mentioned in the video I linked. But I know your the best person to ask about all this kind of stuff. I think the use of you phones with the Wi-Fi only option via hotspot (personal mobile purchased anonymously over public access Wi-Fi hotspots) seems like the best options via access through your VPNs as well. I am just not sure about the Sim card in the mobile hotspot and what information maybe possible for it to pass without my knowledge?

  • @2117david
    @2117david 3 місяці тому

    Thank you.

  • @lumierelartiste2871
    @lumierelartiste2871 4 місяці тому

    ✨thank you❣️

  • @OneLovePeace
    @OneLovePeace 4 місяці тому

    awesome thank you

  • @tamaraallspaugh2962
    @tamaraallspaugh2962 4 місяці тому

    QUESTION: Is there a navigation app that you use for voice direction and maps that isn't invasive?

  • @paulw3231
    @paulw3231 4 місяці тому

    If you log out of gmail for example in a given browser and then clear the cache…will that break the link to the deterministic tracking by Google?

  • @hendralastname3382
    @hendralastname3382 4 місяці тому

    Sir, do u have any solution for side channel attack ?

  • @PictorialWhispers
    @PictorialWhispers 4 місяці тому

    Hi Rob. The scenario: a normal person lives in a home with standard WiFi. This person has logged into Google from that location many times. Now they get a De-googled phone from you. Doesn't Google know this is you anyway from the IP address and attribute all of the data to you anyway? Does a full-time VPN resolve this concern?

    • @WinterInTheForest
      @WinterInTheForest 4 місяці тому

      I believe you are correct and I wouldn't trust a VPN either since so many factors could determine your identity in addition to an IP address. Not that there aren't ways to make it harder but anyone who thinks they are going to avert tracking just with a de-googled phone is only fooling themselves. With the direction things are heading and the way newer devices are being made it's going to come down to whether or not you want to use tech at all.

  • @heatvisuals
    @heatvisuals 4 місяці тому

    one cannot learn without the WHY, what, when, where and who.

  • @staninjapan07
    @staninjapan07 4 місяці тому

    thanks

  • @AkumaQiu
    @AkumaQiu 4 місяці тому

    Do you have an Odysee? Awesome channel :)

  • @cp1cupcake
    @cp1cupcake 4 місяці тому +6

    Have you done a video about how to de-google a phone you already have?

    • @HelplessHawk
      @HelplessHawk 4 місяці тому +2

      He sells degoogled phones. I degoogled a nexus5 and a pixel 3. If you google (lol) you will find how. Good luck 🙂 Rob has said it’s getting harder to degoogle newer phones

    • @jakemelinko
      @jakemelinko 4 місяці тому +2

      Many cannot be

    • @BioCybergoth
      @BioCybergoth 4 місяці тому +2

      I think that's impossible because they will associate the IMEI with the serial number of the device's cpu, board, memory, as long as it has a serial number it can be tracked everywhere and the IMEI is no different, once that detail is given I'm not sure even if you can alter or use a spoofer to the IMEI and change it to something else while offline and in a contained env for data, probably with a new phone without a google account on a new connection from a different ISP and maybe if it's bought from someone else and not you, that is why they are also against rooting because it gives you full control of the device and allows to change everything where they hold no control besides tracking data, Rob or anyone with enough knowledge can correct me if I'm wrong but I still believe this is pretty much a lost cause with an already exposed device to google just for the activation process because it needs to connect with google servers just to pass the activation itself, wonder why they also require a working SIM just to allow anyone to use their devices? that's why, without that, they will block the use of the device by denying the request for activation without an account and without a SIM card, probably not that much but still they have the last word about it and that sucks.
      even though, I think you can still add an account later, but without the initial association to a profile from a possible fixed ISP link under a specific modem from certain retailer, you're locked out of everything the device can do, except emergency calls, you cannot do a regular call without activating the device.

    • @reggiep75
      @reggiep75 4 місяці тому +1

      I'd not be giving away the trade secrets in a video. Best to buy a phone.

    • @WinterInTheForest
      @WinterInTheForest 4 місяці тому

      @@BioCybergoth How do you expect anyone to read that giant wall of text? It's one big run on sentence with horrific punctuation. You need to capitalize certain letters or at least form paragraphs. This is something learned in a middle school spelling class.

  • @pleskbruce
    @pleskbruce 4 місяці тому

    Without knowing the "why" of something, you won't really understand, so all you've got is memorization without the ability to problem solve. Keep on telling why, Rob!!

  • @muzealle
    @muzealle 4 місяці тому

    Where do I start with the privacy journey? Would you recommend changing all of my apple devices and getting new phone number ?

    • @robbraxmantech
      @robbraxmantech  4 місяці тому

      No need for a new phone number. But an additional 2FA phone number and de-Googled phones to start.

  • @andreweden8041
    @andreweden8041 4 місяці тому

    Can you please highlight the video related to international SIM cards that don’t require id thanks

  • @godfree2canada
    @godfree2canada 4 місяці тому +1

    more needed Critical Rational Thought

  • @nickquik
    @nickquik 4 місяці тому

    I'm not sure if you said this because I'm more than 3 fourths of the way finished. But can't google track you based off of your wi fi connections?

  • @user-iu6pw1qw5u
    @user-iu6pw1qw5u 4 місяці тому +2

    @robbraxman do you also write books. Or what books would you recommend ?

    • @terrydaktyllus1320
      @terrydaktyllus1320 4 місяці тому +2

      Books to read or to colour in?

    • @user-iu6pw1qw5u
      @user-iu6pw1qw5u 4 місяці тому

      @@terrydaktyllus1320 books to read. For topic like being anonymous on the internet

    • @MrJohnnyseven
      @MrJohnnyseven 4 місяці тому +1

      ​@@terrydaktyllus1320colour in are always good...

    • @user-iu6pw1qw5u
      @user-iu6pw1qw5u 4 місяці тому

      Books to read 😊

  • @TheTrainstation
    @TheTrainstation 4 місяці тому

    Excellent

  • @jathonholland5833
    @jathonholland5833 4 місяці тому +1

    Why not use a hotspot or a Wi-Fi connection device that can host your Sim card, and then you’ll only need a two identification number for the hotspot or Wi-Fi device to connect to the cellular network. Bluetooth to the phone or tether it for higher speed. That way it (sim card )wouldn’t have any control of the phone. Just have your minimum connection from the hotspot to the cell towers. This would reduce a lot of info. Being pulled out of the phone…

    • @robbraxmantech
      @robbraxmantech  4 місяці тому +1

      You're misunderstanding the threat if you think this. There are multiple threats. This addresses one leaving you open to some big holes. Check out my video on "Lists" from a couple of weeks ago

  • @jamesbaker223
    @jamesbaker223 4 місяці тому +1

    So we have to mask ourselves against the data point pirates?

  • @markcarpenter3600
    @markcarpenter3600 4 місяці тому

    Google can still determine who you are by association with your Bluetooth and wifi mac addressees! Since Google devices are constantly logging who is near by, you would need to only use hard connections to any devices you want to keep google from knowing about. If you are using a VPN is should be on the router to ensure that nothing bypasses the VPN inside of the device.

  • @drifter6870
    @drifter6870 4 місяці тому

    Video IDEA, wireless chargers, how much data do they receive from your phone, do they take phone ID, esp in a car.

  • @ronniecardy
    @ronniecardy 4 місяці тому +1

    I try lots of things you say but then I forget part of the way looking how I got someplace

  • @remco2777
    @remco2777 4 місяці тому

    Could you please give examples or “scripts” to confuse (and defuse) the algorithm on UA-cam?

  • @kenneth1767
    @kenneth1767 4 місяці тому +3

    What do we do when CBDC comes into full effect? Identity will be needed to make financial transactions.

    • @louisecassidy5991
      @louisecassidy5991 4 місяці тому +1

      We are gonna go back to no phone, no internet, and hiding out growing spuds for survival. No digital ID, no Frankenshots, no digital money, be barter only, no car, no license to drive a car, no ability to shop/purchase anything, no health care, no fucking NOTHING! Certainly no job. Are you up for this? Let's all just say no and see how the world comes to a standstill, the NWO capitulates and "the meek shall inherit the earth."

    • @martinb3483
      @martinb3483 4 місяці тому +3

      I guess it is only relevant if you want to use CDBC. Most transactions are registered by your bank anyway. But no one can force you to buy a Google Android or IOS hardware just to use CDBC. I don't intend to use CDBC money as long as there are other ways to pay for my groceries. Fortunately in my location (Germany) it is still common to pay almost everything in local stores, restaurants, etc. in cash. They also accept credit cards, but they still love cash money. And I believe CDBC money will never replace cash completely.

  • @mrcleanse522
    @mrcleanse522 4 місяці тому

    can't you change the imei number? could something be set up to randomly assign different imei numbers on a phone

  • @hilohahoma4107
    @hilohahoma4107 4 місяці тому

    So lol, it didn't take long for a google fi ad to show up lol while I'm watching you. I never see google fi ads wth.

  • @peppaspice5446
    @peppaspice5446 4 місяці тому

    Please do a video on Duck Duck Go's app tracking protection, and all of the data elements that are sent back to google and other entities from certain installed apps.. to include banking apps. Sometimes data is sent when the app isn't even open. To actually see them listed is alarming. From headphone status to name, zip code, and everything in between. Or a video on app tracking protection tools vs VPNs because they can't seem to run at the same time on devices. Which one to choose.

  • @hodlr8489
    @hodlr8489 4 місяці тому

    Hi Brax, if you have not already could you do a video on the effectiveness of Duck Duck Go's Beta App Privacy Protection?
    Also do all search engines have a connection (agreement to share info) with Google or Microsoft in some way?

  • @redtiger7268
    @redtiger7268 4 місяці тому

    My question is texting. Say I use a non-google phone but I am texting a person with a google phone. On their phone they are using the standard text app. What can be done? Do I need to get them to switch to using an app like signal? Although that is now compromised and tracked by the alphabet agencies.

    • @robbraxmantech
      @robbraxmantech  4 місяці тому

      regardless of phone, all texts and calls are captured by the CALEA law. So this is a completely different threat. You must understand the threat that applies.