Go Incognito: A Guide to Security, Privacy & Anonymity | Front to Back

Techlore
Techlore
85.9 هزار بار بازدید - 4 سال پیش - Welcome to Go Incognito, your
Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey.

Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.

Thanks for watching the free version of the course - Go Incognito Premium has no ads, includes quizzes & guides, hundreds of improvements, a certificate, and much more! Support our mission & join the premium experience: https://techlore.teachable.com/p/go-i...

To access the sources, changelog, GitHub repo, and more, visit Go Incognito's Homepage: https://techlore.tech/goincognito.html

Help us spread privacy to the masses! 💜
Patreon: Patreon: techlore
All Support Methods: https://techlore.tech/support.html

0:00:00 1.1 - Welcome! First Words...
0:04:32 1.2 - Why Should You Care?
0:13:02 1.3 - Security vs Privacy
0:17:24 1.4 - FOSS
0:21:33 1.5 - Metadata
0:27:10 1.6 - The Convenience Line
0:31:07 1.7 - Supporting Go Incognito
0:33:42 2.1 - Section 2 Introduction
0:35:07 2.2 - Minimalism
0:43:10 2.3 - Erasing Your Local Identity
0:49:34 2.4 - Erasing Your Online Identity
1:01:08 2.5 - Section 2 Finale
1:02:09 3.1 - Section 3 Introduction
1:03:45 3.2 - Stay Updated
1:07:45 3.3 - Permissions & Settings
1:13:33 3.4 - Passwords
1:27:20 3.5 - Two-Factor Authentication
1:34:01 3.6 - Search Engines
1:38:27 3.7 - Your Browser
1:42:53 3.8 - Hardening Your Browser
1:50:16 3.9 - Your Browsing Habits
1:55:33 3.10 - Browser Uniquness
1:59:56 3.11 - Proxies & VPNs
2:08:13 3.12 - Antiviruses & Malware
2:15:19 3.13 - File Deletion
2:19:12 3.14 - Storage & Encryption
2:24:45 3.15 - Safe Communication
2:33:21 3.16 - Section 3 Finale
2:35:05 4.1 - Section 4 Introduction
2:36:32 4.2 - Desktop Operating Systems
2:42:33 4.3 - Mobile Operating Systems
2:50:19 4.4 - Expendable Operating Systems
2:55:09 4.5 - Tor
3:01:57 4.6 - Cryptocurrencies
3:06:47 4.7 - Audits
3:11:32 4.8 - Section 4 Finale
3:12:40 5.1 - Section 5 Introduction
3:13:58 5.2 - The Basics
3:21:26 5.3 - MAC
3:24:57 5.4 - Networking
3:29:56 5.5 - Radios
3:38:41 5.6 - Device Separation
3:42:30 5.7 - Section 5 Finale
3:44:01 6.1 - Section 6 Introduction
3:44:58 6.2 - Who Can You Trust?
3:50:56 6.3 - Minimizing Data Access
3:59:09  6.4 - Anonymization & Pseudonymization
4:04:02 6.5 - Shopping Safely
4:09:01 6.6 - Lifestyle Changes
4:14:31 6.7 - Pre-configured Hardware & Software
4:17:47 6.8 - Downsides to Safety
4:21:04 6.9 - Becoming an Activist
4:26:04 6.10 - Section 6 Finale
4:26:55 7.1 - Course Summary
4:29:55 7.2 - Congratulations!

🔐 Our Website: https://techlore.tech
🕵 Go Incognito Course - to learn about privacy: https://techlore.tech/goincognito
🏫 Techlore Coaching - to get direct support: https://techlore.tech/coaching
💻 Techlore Forum - to connect with other advocates: https://discuss.techlore.tech
🦣 Mastodon - to stay updated: https://social.lol/@techlore

We cannot provide our content without our Patrons, huge thanks to:
BRIGHTSIDE, Clark, Ente, Larry, Afonso, Boori, Brad, Casper, Cookie, Floyd, JohnnyO, kevin, love your content, NotSure, Poaclu, x
🧡 Join them on Patreon: Patreon: techlore
💚 To see our production gear, privacy tools we use, and other affiliates: https://techlore.tech/affiliates
💖 All Techlore Support Methods: https://techlore.tech/support
#goincognito #techlore #privacy
4 سال پیش در تاریخ 1399/10/10 منتشر شده است.
85,997 بـار بازدید شده
... بیشتر