@davidbombal

Don't be fooled ... Occupy The Web (OTW) tells us the hard truth about being anonymous online. The brutal truth: Will using your neigbors wifi keep you anonymous? Can you hide from the NSA? Can you hide from Google and other companies? Will Tor help you? Will Proxy Chains help?  Which phone do you need to use - Android or iPhone or something else? Which operating system - Windows, macOS or Linux? What is the truth? What do you need to use?

// Mr Robot Playlist //
https://www.youtube.com/playlist?list=PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q

// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal 
Instagram: https://www.instagram.com/davidbombal 
LinkedIn: https://www.linkedin.com/in/davidbombal 
Facebook: https://www.facebook.com/davidbombal.co 
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal 

// Occupy The Web social //
Twitter: https://twitter.com/three_cube

// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://davidbombal.wiki/otw

// Occupy The Web books //
Linux Basics for Hackers: https://amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh
Top Hacking Books you need to read: https://youtu.be/trPJaCGBbKU

// Other books //
The Linux Command Line: https://amzn.to/3ihGP3j
How Linux Works: https://amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: https://amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

// MENU //
00:00 - Coming up
00:51 - Don't use the nighbour's wifi
03:02 - OccupyTheWeb books
03:44 - How to remain anonymous on the internet // The NSA is watching
09:56 - Be careful of your browser 
13:35 - Turn off cookies
15:41 - ProxyChains and Tor demo
22:10 - The FBI story
25:30 - ProxyChains and Tor demo continued
28:36 - How to remain anonymous
33:05 - Using Starlink
36:18 - Recommended operating systems
38:34 - Untraceable phones (burner phones)
40:05 - VPN vs Tor // Don't trust free proxies
42:29 - Don't keep systems together
44:24 - Recommended e-mail service
46:53 - Bitcoin is traceable
47:58 - Anti-forensics // How to clean systems
50:41 - Recommended search engines
51:34 - Have different identities/systems
52:26 - Conclusion

@kittenisageek

Over a decade ago I took a class in network security that was taught by a retired navy intelligence officer.  One thing he taught us that has stuck was: "The only secure computer is one that is not connected and can not be physically accessed.  Once a machine is accessible, it is no longer secure.  The form of access doesn't matter -- physical access, network access, it all compromises the security of the machine.  The line you will need to define in your future career is going to be the line between secure and accessible.  A machine that can't be accessed can't be used, so while it is secure, it isn't useful.  The more accessible a machine, the more usable it becomes -- and the less secure.  The policies you write for your company are going to be a negotiation of that line between accessibility and security."

@seansingh4421

What I hate about the NSA the most is that they’re letting too many abusive cybercriminals get away with stuff these days but common people still have suffer online privacy issues.

@SecurityPrivacyAnonymity6394

My motivation to keep fighting for my privacy is that shit might not happen now, but in the future when my life is a lot more meaningful to me, they might also be a lot harder on how they control us. I hate being controlled, so I decide to learn and do now so I can be ghost later.

@MaxWinner

In the uk, a guy gets stung for trying to meet children online, all while another police department are watching and gathering evidence on his neighbour who has stolen his identity, and is posing as him to meet children online - they let the innocent guy's life get demolished because they didnt want to blow their case, he lost everything - so yeah, they know if you use the neighbours wifi

@USMColdies

Absolutely love David's channel and wanted to add to the OPSEC recommendation of not carrying your personal phone with u to buy a burner- even more important than that caveat, one must NEVER carry around both your personal and burner phone with u at the same time. Any 3-letter or law enforcement agency can create a map of date & time where both your devices are pinging the same celltowers at the same time, thus tying u to the burner with circumstantial evidence. I like to think of the personal cell and burner as your wife and mistress, both should not know of each other much less be in the same place at the same time. And no, this wasn't a reference to infidelity...stay safe

@IanJames56

This is a much needed watch by every American, bar none. As an 20+ year Google user, Youtube, Gmail etc, i am now enlightened! Thank you both!

@brettjamesy

Another great video... The limitation of this technique, is not being able to use burpsuite for MITM and proxychains... However, adding a SOCKS TOR proxy to burpsuite, diverts outbound traffic through the TOR network... without proxychains

@cyberjay0

Much, MUCH appriciation to the both of you David. As a aspiring Cyber Engineer, it's like you guys answer all the little and big questions I think lol Thank you!

@pimpampet7053

Nice video Dave. But strange you're not discussing Tails OS. Get a cheap or second hand laptop with 8Gb RAM (the more the better), a bootable USB3 port (almost al laptops from five years or younger have that) and a USB3 thumb-drive and you have a quite quick anonymous machine....

@vILLmatic24

It's funny, how I tried watching Mr. Robot around the time I started my cybersecurity journey and I thought it was a good show but started losing interest during season 2. Fast forward a couple years later and countless hours of studying pentesting, I decided to restart the series a few days ago and its way better than I remember and so many of the small references make sense now lol. Including the exit node scene from episode 1.

@tjmarx

This was stuff being talked about 3* decades ago in the early 90s. What is being described as anonymity here, is really pseudoanonymity. There is no such thing as actual anonymity online. 

I like to think of the internet as standing in a conceptual digital square wearing a name tag. You can put a disguise on and cover your name tag, but if someone really wants to know who you are, or someone who already knows you and is paying attention comes along your efforts are for nothing. 

You are more anonymous in real life than you are online. So if you're looking for privacy, the ultimate hack is to take offline and into the real world everything you can.

@APT4308

Banger of an interview! We must have more OTW content David. Fulfill your destiny!

@Picsio64

I usually can't sit through long videos but I have to say, listening to OTW kept my attention to the very end. David, you did a great job in allowing him to share his straight forward and easy to follow info on keeping safe online. You asked the right questions and summarized in a succinct manner. Excellent!

@johngoodin3445

One thing that i’ve heard about cell phones is that they can be tracked even when you have the phone turned off. Two of the safest things you can do is simply remove the battery when you’re not using it and use the phone ONLY for outgoing calls. If you’re using a device such as a tablet and you simply can’t remove the battery to wrap it industrial grade tinfoil. Not the cheap stuff you get from the corner store. It will help block any incoming or outgoing transmissions. Keep it Wrapped up at all times unless you’re actively using the device. As far as protection on a laptop. Use an old laptop without any hard drives period and boot off a USB drive running a security version of LINUX. Tales is actually a version of Linux. You can also create a custom version of Linux if you’ve got the skills running off only a USB drive. Remember the laptop itself doesn’t have any operating system on it period nor any storage devices. Folks can’t steal information off of something that never existed in the first place. And when you remove the USB device you could hide it god knows where. It could be in a hut in Brazil or in a igloo in northern Canada. Thats for you alone to know.

@ronigbzjr

I used to work in intelligence over ten years ago, and everything he says checks out. These are all things that were taught to us. I remember reading the public case file that came out after the Silk Road bust and learning that DPR used the same cafe every day to do his browsing and I was like "uhhh, classic mistake..."

@FunderDuck

“I don't know why people are so keen to put the details of their private life in public; they forget that invisibility is a superpower.”
- Banksy

@mehmetmertgunduz

Thanks a lot for creating this video! ❤

@Lars_Paulsen

Another thing that's important is to never mix your hacker life with your public life. That means as an example; If your turner phone is located where your private phone usually is located, that would be a no no, even if your private phone isn't there or off at the time. Treat all of the things you use that can connect to the web or to a phone company as a node and make sure that hacker nodes have never been online in, around, on the way to or together with any of your private nodes. If they have, you can get rid of them at once. This is one of the reasons why there are schools for these kind of government operators. It's also the reason why people who are working under these kind of rules don't do much else than this work. It takes up a lot of the time each day, just to do the smallest thing.

@TheOriginalJohnDoe

Besides quality content, this really feels like a thriller podcast I'm watching. I absolutely love it.