Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf
Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc
Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT
Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575
Techlore's Go Incognito tutorial series:
How to be anonymous on the web
Master uBlock Origin in advanced mode
Important sources and software
Good intro into security approaches and compartmentalization
Every piece of software recommended is listed here:
More direct links:
QubesOS
Intro to QubesOS
Joanna Rutkowska on Qubes
Tor Browser
Tor for iOS
Orbot on Android
Firefox addons
uBlock Origin
- read the docs
Cookie Autodelete
HTTPS Everywhere
DecentralEyes
F-Droid
Firefox Klar
K-9 email client for android
KeepassXC
Gmail
Fireforwarding
How to get a burner phone
Privacy by compartmentalization is very simple. You will create virtual compartments where you concentrate carefully separated pools of data. Each compartment will revolve around a different sphere of your identity.
The more security you want, the stronger walls between your compartments you’ll build.
The first compartment is for your professional identity to separate your business email and work related activity from the rest of your online presence.
The second compartment is for your social media so that you keep those advertising giants away from your digital life outside of their platforms.
The third compartment is for your private identity where most of your light browsing, news reading, watching YouTube and making online purchases happen.
When you become familiar with this practice, you can build more compartments.
Follow me:
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
0 Comments