Email Destroyed Our Privacy - 15 Solutions!
Вставка
- Опубліковано 6 лип 2024
- Email is inherently unsafe. In this video we will discuss why this is the case including some updates on new security practices currently used. We will discuss how there are still flaws in spite of this.
Then 15 Tips and Tricks will be provided which can guide you to a better outcome with email privacy.
Ting for Cheap 2FA Phone Number zg7k3877rnm.ting.com/
-----------------------------------
I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.
I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.
Support this channel on Patreon! www.patreon.com/user?u=17858353
Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)
brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise
bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing
whatthezuck.net Cybersecurity Reference
brax.me Privacy Focused Social Media - Open Source
My GPG Public Key brax.me/f/rob_braxme_public.a...
Please follow me on Odysee! (Previously LBRY)
odysee.com/$/invite/@RobBraxm... - Наука та технологія
9:05 the 15 tips start here ✅
Thanks.
You create the most important videos on UA-cam. So very thankful!!!
That's not an understatement. Big tech being controlled by authoritarian ideologues is one the biggest existential threats to mankind's future.
Greatful for you! 👍🏼🍃💪🏼
O9@@wereproductsnotconsumers8179
he and the hated one
In summary, guarding your privacy on the internet is a full time job!
🌟
I was thinking that, but the more I realize it's not any different than what we did 15-20 years ago. We have to think of how we did things back then and from there think about what's available. It seems that once those habbits are there it shouldn't be too bad.
Once you understand how privacy in the digital world works, you know what to do and what not to do. It's really not as hard as it might seem to be. There are a few rules that you need to go by and apply to what you do on the internet (or anywhere else for that matter). Most people give up not because it's that hard, but because they were conditioned to be lazy and were falsely told that if they are not criminals then they don't need privacy (which is not true of course).
@@Dastardly_X yes
Actually, CB radio provides better privacy
Our privacy has been gone for quite a long time. My grandfather was a bootlegger and they used carrier pigeons or in person communications back in the day, we may have to to go back to those similar technologies.
TLS is broken and quantum computers will soon decrypt traditional security tools. Sophisticated hackers and nation-states are looking to log your traffic right now.
How? By exploiting the known vulnerabilities of TLS. They'll store that traffic until quantum computers allow them to decrypt your information which is right around the corner this year@!
Chas D give me your playlists
Ever hear of IPOAC? (IP Over Avian Carriers: a method of transmitting internet data via carrier pigeons.)
Wow, great story! Best wishes from the UK 🇬🇧🇺🇸
TRUE BUT TRY ON DO BETTER FOR 2022
AWESOME INFORMATION!!!!
Just saw your interview on the Corbett Report and it was awesome!!!
It truly was.
Privacy needs too much discipline and care. No one except 0.0001 % will do this. We are screwed!
I remember some people made it easier by forming a company, but the US government harrased them and shut it down.
@@annihilator9075 If you're thinking of Lavabit, that company was built on a fundamentally weak security architecture that had a single point of failure: there was only one encryption key, which was used to secure every user's e-mails. When the U.S. government demanded access to said key, it would've compromised the security of every Lavabit user, not just the ones being targeted by the govt.'s investigation. Most other encrypted e-mail services use a different set of keys for each user, thus eliminating that single point of failure.
@@annihilator9075 government = cartel
I respect this man so much.
He is doing a great service, I am amazed his videos don't get more views.
TRUE THAT
@@Jeff-lu9wi so as volunteer we should help him. Which email do you use
@@Jeff-lu9wi so as volunteer we should help him. Which email do you use
me too
Rob we're in big trouble 🇨🇦
I know he doesn’t like to talk about politics specifically, but I’ve been thinking about getting in touch with him on Brax.me about mentioning this.
One of his previous videos not to long ago talked about a UK company doing all this research on what people are looking at on the web, mostly with a ‘far-right’ slant, and Canada was in there.
We are the only western nation considering a China-style Great Wall of internet censorship.
Bill C-10 if passed is the beginning of the end…
No other person will tell all all about privacy like Mr. Braxmann.
Thankmyou for this.
If services such as protonmail become widespread, then, they're no longer "you've got something to hide" email. They're "email everyone uses, because privacy is just common sense."
Proton is not safe. They store IP, subject matter is not encrypted (pgp).
I am studying IT focused in programming in school and I watch these videos you make and realize that I know nothing 🤣
I saw you on the Corbett Report on Odysee, you were great!
can you give us the link?
I didn't know they knew each other. Mind blown
@@darksoulsong I tried - but hotlinking is disabled in these comments - visible only to me.
darksoulsong in my playlist
7 dislikes? I guess there are 7 individuals that apparently don't like "Knowledge". Amazing.
Thank you Rob for educating us on these privacy concerns.👍
yes, this is a "high content" channel and that's daunting to a causal viewer who wants to be "entertained" and not do anything about what they learn.
They were Google, Facebook and 5 government agencies.
Working from your Yacht again I see. 😁 Thank you for the informative video about email 👍Ive wanted to hear something about this for sometime !
I watched this on Y.T. And hit the like button. Dang it! LOL! You’re the best, Rob!
Thank you, thank you, this is so overwhelming for me. I would really need to set myself up all over again from scratch.
Essential information, especially now... Thanks Rob.
Invaluable information as always. Many thanks! 😊👍🏼
Nice, ship-shape cabin Rob.
Tanks for the Ting link, learned something new as usual.
Thank you so much for this info. I was just thinking about email privacy🤓👍
Smart to do this videos on your boat... use it as a business write-off since it is your studio/office.
Thank you so much, perfect timing for this video
Much note-taking was done while watching this video!
Dear Mr Braxman,
Thank you so much for your 15 e-mail tips, they were really good, but however people like us can forget some of them. So please put these tips in writing so we can download them and refer to them for our remembrance. Thank you and all the best for all your future videos. ...... Sunny.
Mahalo Plenty for great advice....
1:14 start: Gmail 🤣
2:21 old protocols
3:14 email server
3:50 encryption and metadata
5:15 MTA and SMTP
6:15 Snowden
7:18 STARTTLS
9:04 #1 Hide your IP address
9:55 #2 Segregate your email
11:08 #3 Limited use of real name email
11:59 #4 Don’t use Job email for personale use
12:45 #5 State Players
13:23 #6 Set up your own email server
14:18 #7 Use alternatives to email
15:24 #8 Download email and POP3
16:28 #9 No contact list
17:46 #10 No phone number for 2Fa
18:47 #11
19:18 #12 Dont trust Encrypted services
20:51 #13 Gmail for throw away email only
Ty brother 🫡
Great information. Thank you.
Thank you Sir for enlightenment. I will do it and hope it work. I feel that live with open book.
Thank you, Rob!!!
Mr. H ® Approved ✌🏼 Love ya Rob
Thank you Rob
Thanks for the video !!! It was great !!
It would be great to show us how you do to make our own email server and most secure and anonymous :))
Keep up the good work !!!
This week gmail started requesting new permissions. Wassup with that?
Congrats for your very good videos. A really good job
Rob you bring a very rational and down to earth explanations to a very complex subject. Thanks for this. How would you reverse years of being integrated into gmail and other "free" platforms with all this new knowledge?
Hey Rob, thank you!
Thank you 💓
great tips! thx
If only we would stop thinking "free = free" and realize that it is always a trade, albeit a hidden one, we'd be much slower to grab whatever is free and sometimes, just cheaper. Would you be willing to pay for an email account, monthly? You see, servers, software, maintenance and data cost money, that has got to be covered somehow. No email is "free", there is no such thing as "free space", somebody HAS TO pay for it. And it's you, and the way you pay is buried in and derived from 1500 page long Terms and Conditions that no user in the entire history of computers has ever read. Now sometimes, this can be pretty innocent, just a ton of ads, that's how it started. Now give that situation 30 years and a million of brainstorm sessions all around the globe by money-hungry companies and career hungry individuals and try to begin to understand they have by now exploited every smallest nook and cranny that is not very clearly illegal. And we can not grasp it, because it's too complex and we're busy... living.
Perhaps, getting off the Internet all together would be best. I survived quite well for 50 years without it.
Good idea - and it may be our only option as the nets close on all of our possible options in the future.
Nice boat, Rob
That is a nice yacht!
I RESPECT U WITH SUCH INFORMATION ON HOW BIG TECHNOLOGY IS VERY CORRUPT.. THANKS I WILL KICK THIRD PARTIES OUT OF MY EMAIL FOREVER.
Thank you
One hundred THUMBS UP!
Now when will we be able to get yo vpn via snail mail, while we have that choice!
THANK YOU SOOOOOOOOOOOO MUCH...U ARE HELPING ME TO KICK NEW TECHNOLOGY TO THE SIDE IN THE WAY I CAN.. I MUST CONTROL MY OWN PRIVACY.
Thank you. These days you can encrypt data into pictures. Whether as a deliberate symbol, meme or encoded into the picture data itself...
That is so much to take in brax but are so right,this is very important but I'm not very techy
I've been trying so hard to understand how to make myself safer. Sadly, I have concluded it's not possible. If we are living in a country and time when we need to be concerned that our thoughts and beliefs are a problem THAT is the true issue. The freedom is already lost and no amount of cyber shenanigans will change that.
I purged all my emails and put them in folders if I needed them. So last few days I removed about 2000 old emails. I am already getting less spam emails. That is my biggest concern. Junk mail! Even if you unsubscribe it doesnt stop so sending them to spam. Does putting them in folders and off the in ox keep them private?
Please make a comparison video about Google vs. Apple in terms of privacy. Thanks
What email should we use for shopping--as it will always reveal our shipping address, partial payment details, and most if not all of our real names? What's the best way to limit this information via email?
since this is about email, ill ask again. . .
what are your thoughts on Criptext email?
Scary frightening overwhelming content from an utter tech darling.xxx🌹🌹🌹❤️❤️❤️🌲🌲🌲🎄🎄
Happy holidays!
@@robbraxmantech you too. Merry Christmas and Happy Holidays.xxx
Hey Rob just thought I would mention that after finding by accident that Aol had taken a voice print of ME with out consent I sent a letter asking for an explanation,,,They replied they had sent my request up to another office and would get back to me....This is not the first time a company has done this to me and never have they been able to provide me with a law or statute that allows them to legally do such a thing,,,,,,,,,Take Care,,,,,,,,Douglas
So by subscribing and liking this video, I've just gotten profiled?
Yep
well, in the case of using the phone as 2FA then we have no other option but to use it, we have to use a different line per site to avoid the matching. what other 2FA can be used to avoid this other than phone, with Google services I think we have no other option.
I have several domain names with email server service. You say if we are a group that wants privacy and security we can use this if we communicate within the domane? You say this could be safe? For ex unconfortuble journalists that might get some attention from the state. I also remember you having a free email solution?
You use Google voice for two-factor authentication? Wouldn't using a Google based product or service expose a person to additional surveillance? I mean, if they track and record everything that we do, then that would link a person to an additional service or otherwise.
To get to the 15 points skip to 9:05
Perfect! This makes me want a time stamp for each of the 15 points!!
What a life saver😊
Very good video and information. Do you have email services that you like using or recommend to people (if they follow the tips that you provide)?
One to consider might be Startmail which is from Startpage.
Giving it an initial look, it looks like a good option. Wouldn't having a paid email service paint a digital target on my back?
@@kotanagant9768 ...not if you have other public emails for other purposes.
Rob - google is horrible, also Rob - I use google voice
my domain provider got hacked, i know coz i started getting spam calls trying to sell me webdesign services for my domain which is supposed to have records protection.
I've been using my own personal name domain name for years (>20), but limited to specific use as mentioned (gov't, bank, family, places with full name already), but I use gmail for generic and never associated name, but now I'm wondering about either. My personal domain has been getting much more spam lately, which it never did, so there is a leak somewhere). I was questioning Google Voice, but now two people have said it's okay. Like my credit card, I wish I could generate virtual/temp phone numbers. Interesting mention of Google Gmail, I've always kept it generic/hidden, but places want it for password, so your mention of stores was good, essentially anything that can triangulate with other info. When will profile photos be a concern? I suspect facial recognition and database linking is already occurring.
I think 10 Minute Email is a pretty useful tool in this regard as well
If using an encrypted service yourself how can you protect mail that is sent to a service that doesn’t use encryption? That has to be the most likely scenario right now,. I can see Amazon, eBay or a mom & pop store moving over to end to end encrypted for us. Is it just keep the email and IP as anonymous as you can?
A VPN helps, but cannot always be working. Using the mail client Thunderbird helps, because it prevents auto-arrival of email when the VPN isn't active...unlike other mail clients. Unfortunately, there's no Thunderbird for phones. So I do not link email to any phone and reserve it for only use with a computer.
In many states, voter registration forms, mailed ballots, motor vehicle departments and state web contact forms all ask for your email contact address. And they sell it, along with all of your information.
So what's the advice if you actually DID use part of your name for your email address? I understand why not to use it, but these email accounts are 15+ years old...not so easy to just stop and switch...anyone gone through the laborious process of switching over to a more securely-named email address? Thanks for the video and information!
No. Keep it. buy limit its use. I discussed that.
@@robbraxmantech Thanks! Sorry, I got a bit anxious with posting a question...posted after only watching half of the video 🤭... I'll finish watching though 🙂
Subtitles are missing.
Rob, did you forget the subtitles.
Please install the subtitles again, like on your other videos.
After a few paychecks, I'm just getting a new phone. Let the youtube account just live and age in the ethersphere. Stored in a tiny little corner of a server rack. For some future child legend to stumble upon and spark a world Renaissance.
Do the permissions given to the company that owns an app I install survive uninstalling the app?
yes, depending on how the app is designed. That's why you should always read the reviews before you install the app where people complain about the app doing this.
How about writing the e-mail on an offline computer, then archive it with 7z and password-protect the archive, then send it using Thubderbird in Linux?
Will that do?
It would have to be an awfully long password.
Hello Rob ! ...how about if you attach a pdf file to your email...a file that requires a password to open it ? can that also be read from anyone on the way ...? my lawyer does it and say its safer ...but listening to your video here I am not sure anymore.???
Hi Peter - that is a great idea! I cannot answer your Q in relation to 3-letter agencies, but it seems like a perfect solution for general privacy. For instance at work, and an old buddy wants the low-down on your company as he is thinking of applying for a job; or communicating with a lawyer or friends whilst you are going through a bad divorce and you do not want a plain-language record flying about ther internet.
Hello Rob,
Is it possible to make VM on Android phones (the same as Windows) to have more Security?
Thanks.
See on this channel a more recent broadcast when he answers your question, titled: "Using phones with no SIM" ua-cam.com/video/qhzU0NHIBrc/v-deo.html
@@mistyculous9644 Hello, Yes, I have already seen the video you sent me its link (and it is interesting), but I am wondering if it is possible to make any "Virtual Machine" on android or a 2nd user account with limited authority on Android, the same a Windows?
At least to defeat the phone from viruses and malware by having, for example, a user with limited account authority or a VM on the phone.
If i have my own email server can i forward my gmail to that server?
What does it mean "to have your own server". Do i have to have it in my home, phisically, or is it ok to buy some VPS server and set up my server remotly? In switzerland or some island, or on Africa for example :)
If you set anything up outside the US, it will be outside the protection of the 4th Amendment.
Rob endorses using "linnode" servers, which don't exist in your home. Rob has said in other videos that it's best to not have your own server located in your home, actually.
How do I start from scratch?
This is what I'm thinking:
1. get a degoogled phone
2. new linux computer
3. all new emails, following tips from this video
4. all new logins with fake info
5. new phone number
6. Use all the old stuff from above but only for disinformation
7. I need to copy and paste posts to avoid linking me by key stroke trackers
8. Router VPN and TOR browser or brave
What did I miss?
Your actions depend on your "threat model." Watch OPSEC subject titles on this channel to plan your escape to more privacy - you've got a GREAT START with a comprehensive list!
You're missing "browser isolation," the most simple and free thing to do for starters. Plus, get off Facebook and all Facebook-owned apps. Be sure NOT to download TOR browser until you have a working VPN, you'll get on a "list."
They did it again, with No notification whatsoever.
😆👍🏼 pink bras and underware! Bah haha haha!
I use throwaway phone numbers for authentication.
I understand where some people may want to hide their political views shared in emails, perhaps for business purposes. That may be appropriate and is a matter of personal choice. However, we should never have to fear retribution from government for our speech. Consider the price we pay
when we begin to censor ourselves.
Govern = control, Ment = mind. Mind control.
yes, great point. Unfortunately, corruption doesn't need ethics - it only needs opportunity. This channel points out how the technical opportunities exist, so they are GOING to be used. Gradually is there *is* now retribution and effects from holding certain "opinions" - and it's only a matter of time until "profiling" and categorization WILL be used against people - in fact, this is already happening...and it's frightening!
So, segregating your emails is good advice, and I do this to a certain extent. However, since most of us haven't been using VPN, and most of us access the various email accounts from the same device and IP address, and the government has access to and stores all that data, then can't the government figure that out that all your email accounts are probably the same person?
Love the disinformation plan
A discord Server would BE very good to ask Questions ecetra
for next episode, how about on deep web voyage?
What do you mean? Can you elaborate? Provide a link?
How is protonmail?
I read somewhere that the information in an email is as exposed as the information on a postcard.
I said that
@@robbraxmantech Well there you go!
I used Gmail, creating a new anonymous address, for correspondence concerning a ticket court proceeding. Google, at one point, refused to acknowledge my legitimate password, and I lost access.
whoa... That happened to me. Almost lost a blog I'd been adding to for over ten years. It was only solved by giving them an old burner phone number that I happened to have laying around.
@@mistyculous9644 Good deal. I don't give Google my phone number. They know it is my email, I gave them the correct password. They claimed it was wrong.
BECAUSE CORRUPT GOOGLE WANT U TO GIVE THEM UR INFORMATION WHICH IS NOT RIGHT BECAUSE AFTER U GIVE GOOGLE UR REAL EVERYTHING YOU HAVE NO PRIVACY AFTER THAT.. DID GOOGLE ZACKY ZACKY BURG GAVE US HIS PRIVACY INFORMATION TO US THE CUSTOMERS..NO. BECAUSE HE WOULD GET CURSED OUT TO HIS FACE HOW CORRUPT HE IS WITH OUR INFORMATION THAT HE IS USING FOR FREE. 😄😄😄😄😄 SEE WHAT GOOGLE CEO'S IS DOING TO HUMAN BEINGS.
I thank you for posting this this is what they are doingto me right now. They won’t let me jn my accounts to download my data
@@gumby-galbraith641 I am considering going to court and filing a subpoena. My name is all over the court proceedings.
I even gave them a valid password. They try to compel you to link it to other accounts.
Can you forward your Gmail to something like k9 mail to make it more secure and stop Google tracking?
Yes that's the only option if you don't want Google tracking
@@robbraxmantech Perfect. Thank you for your quick response. Love watching your content. Keep up the great work 👍
@@robbraxmantech just to clarify, would that be to another email address, or would using the Gmail account through k9 mail work to stop tracking?
🛡🛡🛡What's the simple tool? 3:08
Would you still use google voice NOW??? (I watched your video from august 12th)
Use Google in a smart way. Use their resources but don't give them data.
14:19 Anybody know what these are? Do they really exist? If so, why do we use email for anything?
Was unable to login due to google or upset up account google blocked me very concerned.
Why don't you make a video tutorial how to make a mail server like yours?
Is it safe to use Private Window with Tor when using Brave browser?
Not really. You will stick out because of the user agent among other things. Use the tor browser if you really want to be anonymous. But it still is better than nothing.
in case you question the opinion of the person above me, i was a long-term tor user a few years ago and they're 100% correct. user agent narrows down a lot. plenty of sites can also do certain things to tell you're using private browsing. ideally if you're going to use tor at all you're also not using windows.
it's still better than nothing, but it's not particularly good or safe. remember, the only thing worse than no security is a false sense of security.
@@readme_nfo Thanks. I really meant to use Tor private tab when sending emails.
@@macster1457 Possibly, depending on your use case. Depends on your email service, your threat model, what type of content you're sending, etc.
If you just want basic privacy from your ISP for an anonymous/burner email for example, that would be fine. If you're trying to send very sensitive info from an email that's directly attached to your name, then it wouldn't make sense.
Thunderbird Mail!
what about proton mail?
He talks about this in another vid. It's secure on the server, meaning if you send from a proton mail account to another proton mail account, it's secure (except that the server owner can still access it). Gmail is same way, but once you cross domains is travels between them unencrypted plain text. Cross domains equals sending from one server to another like a from your proton mail to a gmail account or any other email address that is not a proton mail address.
So in short, don't use the internet. Got it.
But in seriousness, best advice given right here. Segregation is key.