Go Incognito: A Guide to Security, Privacy & Anonymity | Front to Back

time3 mo agoview17 views

Welcome to Go Incognito, your guide to security, privacy & anonymity in our world. From digital protection, to physical safety, Go Incognito will cover all you need to advance through your privacy journey.

Topics include FOSS, metadata, password management, permissions, two-factor authentication, search engines, browser configuration, proxies, VPNs, antiviruses, encryption, communication, Tor, operating systems, cryptocurrencies, networking, activism, and so much more.

Thanks for watching the free version of the course - Go Incognito Premium has no ads, includes quizzes & guides, hundreds of improvements, a certificate, and much more! Support our mission & join the premium experience: https://techlore.teachable.com/p/go-incognito

To access the sources, changelog, GitHub repo, and more, visit Go Incognito's Homepage: https://techlore.tech/goincognito.html

Help us spread privacy to the masses! πŸ’œ Patreon: https://patreon.com/techlore All Support Methods: https://techlore.tech/support.html

0:00:00 1.1 - Welcome! First Words... 0:04:32 1.2 - Why Should You Care? 0:13:02 1.3 - Security vs Privacy 0:17:24 1.4 - FOSS 0:21:33 1.5 - Metadata 0:27:10 1.6 - The Convenience Line 0:31:07 1.7 - Supporting Go Incognito 0:33:42 2.1 - Section 2 Introduction 0:35:07 2.2 - Minimalism 0:43:10 2.3 - Erasing Your Local Identity 0:49:34 2.4 - Erasing Your Online Identity 1:01:08 2.5 - Section 2 Finale 1:02:09 3.1 - Section 3 Introduction 1:03:45 3.2 - Stay Updated 1:07:45 3.3 - Permissions & Settings 1:13:33 3.4 - Passwords 1:27:20 3.5 - Two-Factor Authentication 1:34:01 3.6 - Search Engines 1:38:27 3.7 - Your Browser 1:42:53 3.8 - Hardening Your Browser 1:50:16 3.9 - Your Browsing Habits 1:55:33 3.10 - Browser Uniquness 1:59:56 3.11 - Proxies & VPNs 2:08:13 3.12 - Antiviruses & Malware 2:15:19 3.13 - File Deletion 2:19:12 3.14 - Storage & Encryption 2:24:45 3.15 - Safe Communication 2:33:21 3.16 - Section 3 Finale 2:35:05 4.1 - Section 4 Introduction 2:36:32 4.2 - Desktop Operating Systems 2:42:33 4.3 - Mobile Operating Systems 2:50:19 4.4 - Expendable Operating Systems 2:55:09 4.5 - Tor 3:01:57 4.6 - Cryptocurrencies 3:06:47 4.7 - Audits 3:11:32 4.8 - Section 4 Finale 3:12:40 5.1 - Section 5 Introduction 3:13:58 5.2 - The Basics 3:21:26 5.3 - MAC 3:24:57 5.4 - Networking 3:29:56 5.5 - Radios 3:38:41 5.6 - Device Separation 3:42:30 5.7 - Section 5 Finale 3:44:01 6.1 - Section 6 Introduction 3:44:58 6.2 - Who Can You Trust? 3:50:56 6.3 - Minimizing Data Access 3:59:09 6.4 - Anonymization & Pseudonymization 4:04:02 6.5 - Shopping Safely 4:09:01 6.6 - Lifestyle Changes 4:14:31 6.7 - Pre-configured Hardware & Software 4:17:47 6.8 - Downsides to Safety 4:21:04 6.9 - Becoming an Activist 4:26:04 6.10 - Section 6 Finale 4:26:55 7.1 - Course Summary 4:29:55 7.2 - Congratulations!

πŸ” Our Website: https://techlore.tech 🏫 Techlore Coaching - to get direct support: https://techlore.tech/coaching πŸ•΅ Go Incognito Course - to learn about privacy: https://techlore.tech/goincognito

Connect with our privacy community: βœ‰οΈ Blog: https://dispatch.techlore.tech πŸ’» Forum: https://discuss.techlore.tech Ⓜ️ Mastodon: https://social.lol/@techlore

We provide all content & resources for free, please consider supporting our work to help us expand our content: 🧑 Patreon: https://www.patreon.com/techlore πŸ’– All Other Support Methods: https://techlore.tech/support #goincognito #techlore #privacy

Loading comments...