How to be Invisible Online (and the hard truth about it)…

Don\’t be fooled … Occupy The Web (OTW) tells us the hard truth about being anonymous online. The brutal truth: Will using your neigbors wifi keep you anonymous? Can you hide from the NSA? Can you hide from Google and other companies? Will Tor help you? Will Proxy Chains help? Which phone do you need to use – Android or iPhone or something else? Which operating system – Windows, macOS or Linux? What is the truth? What do you need to use?

// Mr Robot Playlist //

Mr Robot

// David\’s SOCIAL //

Connect with me:
YouTube Main Channel
YouTube Tech Channel:
YouTube Clips Channel:
YouTube Shorts Channel:
Apple Podcast:
Spotify Podcast:

Support me:
Or, buy my CCNA course and support me: CCNA ($10):
Udemy CCNA Course:
GNS3 CCNA Course: CCNA ($10):

// Occupy The Web social //

// OTW classes //
Hacker\’s Arise Pro Subscription for $32.99 a month:…

Get 3 year\’s access to all live courses for $750:…

// Occupy The Web books //
Linux Basics for Hackers:
Getting Started Becoming a Master Hacker:
Top Hacking Books you need to read: Top Hacking Books…

// Other books //
The Linux Command Line:
How Linux Works:
The Car Hacker’s Handbook by Craig Smith:
Hacking Connected Cars by Alissa Knight:

// Occupy The Web Website / Hackers Arise Website //
OTW Mr Robot series:

Want to learn more from Occupy the Web? You can join his classes using these links:
Hacker\’s Arise Pro Subscription for $32.99 a month:…

Get 3 year\’s access to all live courses for $750:

// MY STUFF //

Interested in sponsoring my videos? Reach out to my team here:

// MENU //
00:00 – Coming up
00:51 – Don\’t use the nighbour\’s wifi
03:02 – OccupyTheWeb books
03:44 – How to remain anonymous on the internet // The NSA is watching
09:56 – Be careful of your browser
13:35 – Turn off cookies
15:41 – ProxyChains and Tor demo
22:10 – The FBI story
25:30 – ProxyChains and Tor demo continued
28:36 – How to remain anonymous
33:05 – Using Starlink
36:18 – Recommended operating systems
38:34 – Untraceable phones (burner phones)
40:05 – VPN vs Tor // Don\’t trust free proxies
42:29 – Don\’t keep systems together
44:24 – Recommended e-mail service
46:53 – Bitcoin is traceable
47:58 – Anti-forensics // How to clean systems
50:41 – Recommended search engines
51:34 – Have different identities/systems
52:26 – Conclusion

proxy chains
tails linux
invisible online
hide identity
kali linux
online privacy
internet security
online privacy and security
online privacy tips
online privacy guide
internet security tutorial

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Disclaimer: This video is for educational purposes only.

#wifi #iphone #android

  • David Bombal