Privacy Primer: Partitioning Email, Phone number, Devices

Sdílet
Vložit
  • čas přidán 7. 09. 2024

Komentáře • 156

  • @berlinirving3589
    @berlinirving3589 Před 2 lety +51

    People should also realize that even if we implement every privacy measure tomorrow, anything personal that has been mined from us previously will always be linked to our real name. There's nothing that can be done about this. Our only hope is to protect ourselves from adding any more information to their file from now on, and to have no link leading back to the info they already have. This requires always thinking about anything that we are about to do, in case we make ourselves vulnerable again.

    • @HTWW
      @HTWW Před 2 lety +1

      Yeah. I wonder what kind of an event (barring Apocalypse-level options) is needed to reverse that.
      I mean, sure, things like:
      1. A massive CME hitting us dead on.
      2. Nuclear war.
      3. Bladerunner:Blackout
      would definitely work, but maybe, hopefully, less drastic measures would suffice?

    • @FredSpade
      @FredSpade Před 2 lety +5

      @Rejekelstrong Except they are already in the process of turning your children against you.

    • @jameslynch8738
      @jameslynch8738 Před 2 lety

      @Rejekelstrong The more you hide the more they can lie about you. These people have no ethics or decency, they are friends, family, associates and they love to build their platform by destroying people any way they can.

    • @benhicks9494
      @benhicks9494 Před 2 lety

      @@jameslynch8738 what platform?

  • @LostAmericanJ
    @LostAmericanJ Před 2 lety +10

    As always Rob's looking out for us. You know... You go ANYWHERE else seeking out this kind info you pay out the A$$ for it or have to be getting a degree for cyber security. THIS GUY, THIS REEEEEAL AMERICAN and HUMAN RIGHTS HERO, just gives it out for free! ROB U ARE A HERO!

    • @thomasradovnikovic6518
      @thomasradovnikovic6518 Před 2 lety +1

      Every one should consider buying a degoogled phone. To protect their privacy!

  • @zwarst
    @zwarst Před 2 lety +6

    man i wish i had you in computer studies at school.
    1- no real names on internet or join platforms like zucking FB
    2- separate multiple emails partitioned by ID
    3 -Have multiple phone No's, one for real & other for internet.
    4- Use a de-googled Phone - no device finger print
    5 - Use a VPN - IP kept private.

  • @noelmckinney9559
    @noelmckinney9559 Před 2 lety +27

    You do humanity a great service. I need to up my game. When this phone dies I want to become a customer. Much to learn though.

  • @RoninDosho
    @RoninDosho Před 2 lety +9

    As Always, this is the best of the best privacy and internet security information! Thanks

  • @surfingnoid
    @surfingnoid Před 2 lety +3

    I've been in IT for 30 years and know all this. Well, maybe not about some of the newer technologies like BTLE which have not directly affected me (yet), but I could never articulate all of that information as eloquently as you, Sir!

  • @lyfandeth
    @lyfandeth Před 2 lety +10

    Start by adding every member of Congress to your contact list. I'm sure you can find other influentional groups. Build those links!

  • @RSM0047
    @RSM0047 Před 2 lety +7

    Thanks!

  • @ronaldmcdonald4368
    @ronaldmcdonald4368 Před 2 lety +1

    You are my hero don't listen to any of the CZcams bots and trolls you also need to make cheaper simple de-googled phones for all the 3rd world countries, THANK YOU SO MUCH!

    • @robbraxmantech
      @robbraxmantech  Před 2 lety

      I'm limited by what's available. Unfortunately I'm just a service provider. I cannot manufacture.

  • @WmTyndale
    @WmTyndale Před 2 lety +4

    Excellent and Invaluable presentation. Wonderful Intellect!

  • @Go_Show95
    @Go_Show95 Před 2 lety +8

    Thanks Brax
    Crushing it as per 😎🥂

  • @zita-lein
    @zita-lein Před 2 lety +3

    GREAT video! Loved having it all laid out like this. Very shareable with those who don’t dine on this stuff regularly. Thanks!

  • @toohottohandletoocooltomel4199

    I use 7 browsers on USB sticks. I used to carry my phone to know the time. I was connected to Walmarts WIFI or whatever it's called without my permission. I bought a watch. and leave the phone at home. I bought a Faraday bag for those rare times I may need to use it away from home. I guess I'm lucky to not have family or friends who want to talk to me.

    • @AhatiMaat
      @AhatiMaat Před 2 lety +1

      How does the USB browser sticks work? Instead of them being downloaded to the computer, they are downloaded to the USB?

    • @MadCowMusic
      @MadCowMusic Před 2 lety

      ​@@AhatiMaat It's one of the many portable apps. It seems that it opens up some additional vulnerabilities, like physical security of the usb drive, and what data it stores that may need mitigation.

    • @toohottohandletoocooltomel4199
      @toohottohandletoocooltomel4199 Před 2 lety +2

      @@AhatiMaat Well I'm no expert. But some browsers come in a portable version. Firefox comes in a portable version. I am 70 so my memory may not be so good. I bought a thing that holds 7 usb sticks with switches to turn them off and one. I for example use PaleMoon for E Bay only it's never been anywhere else. I rename them so I remember what each one is for. Microsoft Edge is renamed Outlook and is only used for email. I put a short on my desktop that takes me to Firefox on the USB. I hope that makes sense.

    • @carolyncannon7805
      @carolyncannon7805 Před 2 lety

      Wat

    • @carolyncannon7805
      @carolyncannon7805 Před 2 lety

      @TooHotToHandleTooCoolToMelt Are those new slacks?

  • @ainzooalgown7589
    @ainzooalgown7589 Před 2 lety +7

    when i say stuff like what you mentioned i get called paranoid

    • @josiet.2661
      @josiet.2661 Před 2 lety

      To them It's called paranoid, to us... IT'S INTELLIGENCE❗

  • @robine5454
    @robine5454 Před 2 lety +1

    Rob, you mention getting a Google phone # (Google voice) for free. I did that and had it for quite a while and used it rarely. The last 2 times I tried to use it, Google demanded I share my contact list. I refused so they denied me use of the #. And they eventually took back the #.
    That woke me up to the fact that, even if I have a degoogled phone, my name and phone number will still be leaked via other people's contact list!

    • @fionnuna7947
      @fionnuna7947 Před 2 lety +1

      It's unbelievebale, Big Tech has too much power.

  • @thomasradovnikovic6518

    Thanks again Rob……..acting on your previous advice I bought a degoogled pixel 2xl phone loaded with Calyx os …..learning to navigate really sharpens my 79 yr young brain!

  • @ScorpionCar
    @ScorpionCar Před 2 lety +9

    Great video, shows how tech shouldn't be seen as benign

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +22

      Unfortunately this kind of video doesn't have drama so it has much fewer views. Sad but the more "teaching" I do, the worse the video does. I get viewers only when I describe a crisis (not necessarily a solution). This is a solution video

    • @scotttovey
      @scotttovey Před 2 lety +4

      ​@@robbraxmantech
      "I get viewers only when I describe a crisis (not necessarily a solution). This is a solution video"
      CZcams caters to a drama queen society.

    • @carolyncannon7805
      @carolyncannon7805 Před 2 lety +3

      Just keep being you, rob

    • @ArtOfHealth
      @ArtOfHealth Před 2 lety +1

      You should just focus on helping your committed clones that keep redistributing and teaching your information. Are you aware of the Fabian Method? It takes the slow but very steady pace to create an impact and of course change. It was used in a sinister way. But, I believe I use this principle quite successfully when sharing your information. Rob, you keep putting out solid provable information and we will do our part as well.

    • @gregsz1ful
      @gregsz1ful Před 2 lety

      @@robbraxmantech trying to figure why my WiFi router turns off signal lately connected to Xfinity modem. I tried another router and it was even worse. Signal just shuts off. Can Xfinity shut down my router. They wanted me to install their combo unit. I have to reset router so signal returns.

  • @benkepmen6964
    @benkepmen6964 Před 2 lety +5

    This information is extremely relevant in a world where one's rights are being diminished do to a Global Pandemic.

  • @happypotential
    @happypotential Před 2 lety +2

    Thank you very much, Rob! 🌞😀🤗

  • @astrophotonics9470
    @astrophotonics9470 Před 2 lety +1

    Rob and The Hated one both Tops in my Book.

  • @BramSLI1
    @BramSLI1 Před 2 lety

    Well, this is interesting. I just did a search for my name on Google and there are just too many with my name to count. I guess my folks inadvertently assisted with my privacy. These are still very good tips for privacy.

  • @Dang3rMouSe
    @Dang3rMouSe Před 2 lety

    Yeah I have mainly used a single phone as a device & have thought about this major issue. Have done certain things to limit data but certainly not enough. Will be looking into a de-googled phone coming up.

  • @venividivici6466
    @venividivici6466 Před 2 lety +2

    Wealth of information!
    Thank you.💖

  • @web3982
    @web3982 Před 2 lety +8

    The absolute dumbest reply, "I have nothing to hide"!

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +11

      There's a comment like that in every video. LOL

    • @web3982
      @web3982 Před 2 lety +4

      @@robbraxmantech As it should. It must be repeated over and over again, till it begins to register and make sense!

  • @debbieandmarc
    @debbieandmarc Před 2 lety +9

    Very good info. You may recall the recent news story of a woman who had an altercation with a man whose dog was causing an issue. The man videoed her out of context and accused her of discrimination. He doxxed her without mercy, called her employer and she was fired. I just want to know what you think of the steps or process the man used to destroy the woman's life. How did he do it? Thank you.

  • @LoftechUK
    @LoftechUK Před 2 lety

    Best advice. I’m going to watch again until I get the full facts as I’ve got a thinking issue but I know I will after a few times. It makes sense but I do use Express VPN and very very happy with it. Just need to pin it all together. 🙏

  • @hasdrubalsosamarquez5430

    These are the questions I mostly ask about...I am a Mobile Soldier. Mr. H® approved...

  • @somewhere6
    @somewhere6 Před 2 lety +1

    Informative and useful as always.

  • @newtoncain
    @newtoncain Před 2 lety

    It is now the quickening, prepare yourself. The struggle for your soul is at hand. Whether you believe that you have lost it or are in full control of it. YOU ARE WRONG. You have a choice to make for better or for worse or for neither. Ascend, descend or evade, You can gain the path you want in the current moment. You must choose a side and stick to it.

  • @masteragario3335
    @masteragario3335 Před 2 lety +3

    I'm 50 and happen to question the narative of space and the ground we walk on. I recieved a spam Quora email today....."How can I prove the earth is a globe to my dad". I have witnessed Alexa products listening and then hitting you with focused advertising. They are so listening, hard.

  • @berlinirving3589
    @berlinirving3589 Před 2 lety +6

    Rob, what about using more than one computer, both using VPN but choosing different nations to log into? The VPN provider will know it's the same identity because they are being paid each month, but there would be no other crossover of information between the two, and using your new VPN service that problem can be even more minimized. One computer could be used for real life and business; the other for using fake identities and social media. I know the same separation could be obtained using multiple login identities on one computer [fred01, barry02, etc], but it's a pain to have to keep switching from one to the other each time there's a need.

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +9

      A little overdone for Big tech opposition. But yes it would do well of course. I don't think it is necessary though. A VPN aggregates data from multiple sources. Since my VPN has no logs. All I know is that you're using it. I don't know what you're doing. And with other people in the mix (hundreds), it's not possible to match to identities. And on top of that the traffic is mostly HTTPS (encrypted) anyway.

  • @ronfox5519
    @ronfox5519 Před 2 lety +5

    This is great info. Thanks Rob!

  • @Ottee2
    @Ottee2 Před 2 lety +5

    Thanks, Rob. Can you address credit/debit card compromise at online point of purchase? Hacker may have card number, email address, actual home address, and phone number.

    • @amosmoses8402
      @amosmoses8402 Před 2 lety

      Easily done by a hacker.

    • @amosmoses8402
      @amosmoses8402 Před 2 lety

      A hacker can get your information from you home internet and by being online. They get your IP address, your address, phone number, the kind of phone you are using and your birth date, annnd your name. That’s all a hacker needs to steal your identity and all your personal information. It happened to me.

  • @marcgoodman4561
    @marcgoodman4561 Před 2 lety +2

    When you register a sim card you'll need a debit card, passport or driving license.
    There is no privacy

  • @tedo3332
    @tedo3332 Před 2 lety +3

    Is there a way to fill these databases with bogus conflicting data? Perhaps a bot that can be run when CPU cycles are not being used. If you can create an identity that matches everything then doesn’t it become useless?

  • @billynomates920
    @billynomates920 Před 2 lety +3

    ditto!

  • @somedude5951
    @somedude5951 Před 2 lety

    Every high school should teach these facts to the new generation.

    • @benkepmen6964
      @benkepmen6964 Před 2 lety

      If that were the case crook's would have to become that more smarter and we've all have to work HARDER to protect our rights / privacy as compared to what we're experiencing now.
      Laws need to be changed to protect Americans and Government Agencies that unlawfuly spy on American Citizens need to be shutdown.

    • @FredSpade
      @FredSpade Před 2 lety

      Schools are compromised. They're indoctrinating the next generation and big tech are one of the beneficiaries.

  • @knothead35
    @knothead35 Před 2 lety +2

    What can be done now when you've already used your phone number for years...literally a decade. It can't be erased now..seems like most people are probably screwed

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +5

      As the video explains, keep the phone for real people, and another number for 2FA. Don't mix the two. That is explained in detail

  • @TedFreitas
    @TedFreitas Před 2 lety +2

    This is all great for the techie type person. However I’m gonna venture to say 95% of the world would never be able to adhere or even implement these suggestions. It’s really scary to realize how far down the rabbit hole we have gone and how much privacy we have lost. Hummmm….

    • @robbraxmantech
      @robbraxmantech  Před 2 lety

      Zuck knows we're zucked because no one will listen.

    • @xofcenter5576
      @xofcenter5576 Před 2 lety

      The average person isn’t going to suffer even a minor inconvenience when they can automagically access their “free” services.

  • @jjones2896
    @jjones2896 Před 2 lety +2

    That stalking activity sounds unlawful

  • @pantarei.
    @pantarei. Před 4 měsíci

    There is a little problem with VPN's. You have to trust that your provider does not sell your data (or use it in a different way).

  • @toohottohandletoocooltomel4199

    Searching myself on the internet does not interest me. I already know I screwed myself by giving out too much information.

  • @youguysaregreat
    @youguysaregreat Před 2 lety

    Some agency listens while you talk on cell phone. Most probably through the cell towers. How to know if they are listening to you. If they do then how to stop them from listening?

  • @bruceli9094
    @bruceli9094 Před 2 lety +3

    McAfee did not uninstall himself.

  • @AleksyGrabovski
    @AleksyGrabovski Před 2 lety

    Hi Rob, thanks for your work, can you make a video about I2P network and how it might be used for a secure communication?

  • @wendys390
    @wendys390 Před rokem

    Mr. Braxton, I guess if you forward your emails to another email, that is also visible? So you can never forward emails to another email or else it is like not having another email at all?

  • @lyfandeth
    @lyfandeth Před 2 lety +1

    Are there any 3rd part contact management apps that are content to simply sell their apps, and not suck back the data? So by going to a 3rd party add, you can keep it personal?
    Or would you have to keep it in a generic database, excel, etc. file?

  • @igounfazed
    @igounfazed Před 2 lety

    With the google voice number (this video I think, I've watched a couple back to back before commenting)... I think I have never used a real number to 'activate' it to. Nor have I linked it to a number. I simply to chose the "skip" option. I started google voice on a desktop (skype alternative) then used it on a wifi only tablet, then put it on a 'cell phone' with no cellular service. The application recognizes device type, so I have only received the notification to attach a phone number when initially running the app on a device that can use cellular services. But again, I just selected "skip".

  • @JimJones-999
    @JimJones-999 Před 2 lety +4

    Do the de-googled phones have any back doors to the person who de-googled it? Can the person you got it from access info from it after the fact?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +5

      AOSP is open source. I use LineageOS which is open source

    • @jameslynch8738
      @jameslynch8738 Před 2 lety

      Well if anyone in the chain did it would likely be through a third party, whether it's a vendor, organization and even govs. If it's a targeting campaign you'll see multiple third parties and a huge amount of misrepresentation of collected personal characteristics. The types of attacks will likely vary depending on the nature of potential adversaries. I think it increases in severity depending on the target from bait and gaslighting into full out burn protocol with people staging and reporting. As far as I can tell, everyone ghosts so it's hard to collect info which I guess means it's highly effective.

    • @benhicks9494
      @benhicks9494 Před 2 lety

      @@jameslynch8738 what do you mean "staging and reporting"? Burn protocol?

    • @jameslynch8738
      @jameslynch8738 Před 2 lety

      @@benhicks9494 That would depend on how advanced the adversary is.

    • @benhicks9494
      @benhicks9494 Před 2 lety

      @@jameslynch8738 what kind of adversaries would use these tactics and why? Anyone can be targeted?

  • @EconaelGaming
    @EconaelGaming Před 2 lety

    When it's so difficult to protect yout privacy, it's easier to use the internet less.

  • @megaluria9654
    @megaluria9654 Před 2 lety

    Hi Rob - wouldn't it be much easier and private to do authentication using a HW stick like YubiKey with no reliance on your mobile phone at all? The way you describe it is too complicated to me.

  • @KT-jy3mr
    @KT-jy3mr Před 2 lety

    Rob, on my phone I access almost all information, including youtube, through the duck duck go browser and clear cookies after each visit. Also use a VPN. So I can't be tracked using a device fingerprint this way, right?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +2

      No. Sorry. Google is working in the background.

  • @catalinaleon8040
    @catalinaleon8040 Před 2 lety +1

    O se ponerlo no se ponerlo soy muy torpe. Base conectarme llo tengo una parato para ver películas pero no sé por Merlo soy muy torpe estoy sola no lose ponerlo

  • @darklotus5309
    @darklotus5309 Před 2 lety

    Wouldn’t Startpage still be @ the mercy of the echo chamber sanitized search results as google because it’s using google?

  • @julyseng5653
    @julyseng5653 Před 2 lety

    Bad nosy neighbors.

  • @cinventures
    @cinventures Před 2 lety

    Can you make a review regarding Session app please... It is a private messaging app..thanks

  • @shockingguy
    @shockingguy Před 2 lety

    Hey ROB sorry I’ve been so absent 😞

  • @behindblueyes
    @behindblueyes Před 2 lety

    I was thinking....is there any way to 'clean up' or just remove prior internet profile? I mean, we all probably have a LOT out there. I know I do. Also, where do you start? :D If you can't do all, is it worth it even to do some? For example, my $ is made through FB marketplace. I also have a couple groups I'm connected with there that are very helpful for local political organization and general health. But I really don't do much besides those 2. Commenting, posting, etc. hardly at all. How to start from ground zero when your whole family isn't on board and will still tag you in things, not do a VPN, etc?

  • @mogbeamreyan8912
    @mogbeamreyan8912 Před 2 lety

    Great Job👍🏽, please I need your help, my phone is being controlled by hackers.. How can I help it?

  • @robby5356
    @robby5356 Před 2 lety +1

    This may be a noob/obvious question but can a dual sim phone be tracked and have both sim cards compromised even if you compartmentalize the usage of the sim cards?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +3

      If it's de-Googled I think it will work. If it's a regular phone, Google can read the security chip, IMSI and IMEI so the device fingerprint is the same

    • @robby5356
      @robby5356 Před 2 lety +1

      @@robbraxmantech Thank you for answering. I'll remember that in the future and differently go for a de -googled phone

  • @lyfandeth
    @lyfandeth Před 2 lety

    Rob, Microsoft (used to? Still does?) track the internal serial numbers of your computer drives and inventories the graphics card, amount of ram, and other factors to authenticate a Windows serial number is only used on one machine. So it is confirmed that your computer can be identified by internal serial numbers that are unlikely to change, except during upgrades. Doesn't that also provide another level of fingerprinting on computers?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +1

      Yes. But the tracking of your social media is done by other parties and they can't access those serial number things from the browser

  • @AngryIrishman0007
    @AngryIrishman0007 Před 2 lety

    Should we buy a Iridium Phone and just use the data with another WiFi phone? What are your thoughts on Starlink?

  • @BobJones-dq9mx
    @BobJones-dq9mx Před 2 lety

    Can anyone answer this question? What is the name of the governmental platform which transforms an individual to a walking transponder even though the person has no electronic devices, just his new passport?

  • @livecrosswire
    @livecrosswire Před 2 lety +1

    You do not speak about using a VPN for cell phones using data?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +2

      I did explain it, I hope, clearly. It's not as important when on LTE, at least against big tech. Though it may have other importance for security reasons

  • @tomcondon6169
    @tomcondon6169 Před 2 lety

    Here is a difficult hypothetical, What if you need to have a document notarized, and it has your Social Security number, birthdate, Mother's maiden name, and other personal information? What if the Notary Public sees a need to keep a copy of what they assert is true? What if this N.P. is vulnerable to compromise, criminal, or financial, willing to sell personal information to entities that would never reveal how they gained this information?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +3

      You cannot stop your real name data from leaking. that's settled. You can stop correlating other activities to your real name though

    • @tomcondon6169
      @tomcondon6169 Před 2 lety

      @@robbraxmantech Thanks Rob for taking the time.

  • @chazzlidell7653
    @chazzlidell7653 Před 2 lety

    Jorge Menendez runs an illegal car chop shop. Lol 😆 lol I want to

  • @robertzitting4547
    @robertzitting4547 Před 2 lety

    Rob, I haven't heard much about satellite phones , I'm new to your channel but ,would they be a privacy option?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +1

      Sure. Expensive and minimal privacy gain. Maybe the main benefit is that the phone does not have apps

  • @diva555sg
    @diva555sg Před 2 lety +1

    Free vpn will not be so useful at home cos all devices uses router. So I will need a vpn router correct?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +3

      There is no real privacy with a "free VPN" since those are usually proxy servers (which cache your internet activity).

    • @diva555sg
      @diva555sg Před 2 lety +2

      @@robbraxmantech thanks for the confirmation.

  • @HumorousLOL
    @HumorousLOL Před 2 lety +1

    Can we change our phone ip address so that the ip address we have emitted in the past are useless?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +3

      LTE Ip address is shared from a pool. So only carrier knows who used it at any particular time. It is not an identifier to an outside party. The threat is DSL IP

    • @HumorousLOL
      @HumorousLOL Před 2 lety +1

      @@robbraxmantech So basically the main issue is when you are on a desktop on broadband connections? It is ONLY DSL, or is this also an issue on cable internet?

  • @danwithjesus
    @danwithjesus Před 2 lety

    LOL when i heard zackbook

  • @TheZualtea
    @TheZualtea Před 2 lety

    great

  • @sara1364
    @sara1364 Před 2 lety

    Have an unknown recovery ph# on Google account? Not sure if peeps.

  • @gigir6761
    @gigir6761 Před 2 lety

    I cannot afford to trash my $1,000 phone and buy a de-Googled phone. I struggled to pay for this phone.

  • @jamee6
    @jamee6 Před 2 lety

    Is browser isolation worth doing on a cell phone at all?

  • @ratakses
    @ratakses Před 2 lety

    Rob, do we know for sure that VPN Providers does not save our Information, or we just assume that?

    • @robbraxmantech
      @robbraxmantech  Před 2 lety

      There's trust involved. So just so you know, I'm a real person running a VPN service with your privacy in mind. Not a big corporation

    • @ratakses
      @ratakses Před 2 lety

      @@robbraxmantech thank you for the answer, now i have a theoretical question: lets say that in the future the west become totalitarian and the governments will go to VPN providers and demand past information or data on users. can VPN providers search and give this information to the government (assuming they do as they claim and not saving any data on users) ?
      P.S your content is a necessity !

  • @catalinaleon8040
    @catalinaleon8040 Před 2 lety

    No tengo ordenador ni juegos ni internet no funciona nada

  • @demonee-ho491
    @demonee-ho491 Před 2 lety

    about the device ID. What would happen if I have a google phone with a linux os (not android of course)?

  • @diva555sg
    @diva555sg Před 2 lety

    So disable 2FA?

  • @GaryCameron780
    @GaryCameron780 Před 2 lety

    #BuildTheWall :)

  • @giovannip.1433
    @giovannip.1433 Před 2 lety

    This is what supposedly clever criminals should realize - 'they' know you are a criminal. 'They' know whom you are doing deals with. The only reason you aren't being arrested is because the controllers of that information want to make more money, gain more power than waste their time on 'small fry'. e.g. Smugglers 'get away' with it for a bit of time then get caught - how much did they smuggle before being caught? whos' product were they smuggling? When the public 'demand action' for criminality, they throw the public the bones, the waste or expose criminals after they are no threat to 'their' business. E.G. Epstein, Savile, Narcotics...

  • @American_Moon_atOdysee_com

    You know, we can do these privacy things because we live in a pretty good place, America. Yes, CZcams sucks and America has all kinds of bad. But we are seeing this ON CZcams and America allows this. My friends in China can do none of these privacy things. And it is MUCH worse there.

  • @catalinaleon8040
    @catalinaleon8040 Před 2 lety

    Llo no veo nada no kiero más tontería ni ver películas no veo nada estoy esperando los dineros no puedo ablas ni trabajar ni nada no puedo ver nada menos película no puedo pagarla nada

  • @hikerJohn
    @hikerJohn Před 2 lety

    We cannot buy any products or services even from you without it being traceable

    • @robbraxmantech
      @robbraxmantech  Před 2 lety

      I didn't know that I was selling things that require tracing. I just sell phones and networking products and services.

    • @hikerJohn
      @hikerJohn Před 2 lety

      @@robbraxmantech All transaction are traceable are they not? The *things* you sell don't require tracing but the transaction itself does. I'm still watching more of your videos, cant decide if it matters at this point since I'm so old. I do know my friends that are police do not use facebook but there spouses do.

  • @catalinaleon8040
    @catalinaleon8040 Před 2 lety

    Llo no tengo ordenador no tengo privado no tengo nada no kiero nada gue me dejes en paz llo no kiero nada más gue lo mío no kiero ser rico Hi libre trankila solidaria Hi en mi casa sola agutito libre de todo los líos

  • @catalinaleon8040
    @catalinaleon8040 Před 2 lety

    Todo el mentira solo habla ni lo entiendo nada gracias

  • @catalinaleon8040
    @catalinaleon8040 Před 2 lety

    No estiendo chino déjame en paz no tengo ordenador no se tocarlo sin título ni internet ni estudios vucate a un chino gue hay munchos un parado de trabajar más gue llo no valgo nada no me valores tanto sin estudios vucate an un negro Ho blanco meda higual llo estoy en mi casa con mi perrillos chicos ditraida me guta más gue tu trabajo de chinos no lo entiendo nada vucate ha hotro chino déjame en paz no kiero tanto dinero chino no lo entiendo nada ni de letras no puedo ablas nada ni tengo tiempo nada más gue mi perrillos son tan bonitos gue no lo dejo solos nunca me lo llevo en el carrillo de la compra ala calle me alluda atiral del carro abecés tiran de mi rodillas no puedo andas Hi de carrillo son tanbonitos

  • @suspiciousperson5324
    @suspiciousperson5324 Před 2 lety

    PLEASE CUT THE MUSAK, ìt really, really, f**ks up we who use hearing aids. Thank you.

  • @Seer645
    @Seer645 Před 2 lety

    I wish you could limit your videos to 10 minutes.

    • @robbraxmantech
      @robbraxmantech  Před 2 lety +3

      I can guarantee you that's not going to happen. Sorry.

    • @amosmoses8402
      @amosmoses8402 Před 2 lety +1

      Rob has the greatest information.. listen and learn!

    • @amosmoses8402
      @amosmoses8402 Před 2 lety

      @c2s Me as well. Rob is an intelligent man and he does know what he is talking about. It’s a good thing that he is here for all of us so we can learn from him. Much love 💕

    • @amosmoses8402
      @amosmoses8402 Před 2 lety

      @c2s I agree and they also don’t know the risks of the web, and websites that they are going on.