Snowden says don't use Wifi, I explain why
Vložit
- čas přidán 27. 09. 2019
- Snowden said this week:
"I wouldn't use WiFi at home, because global maps of every wireless access point's unique ID-including yours-are free and constantly updated. I would use ethernet; yes, ethernet on a phone."
Using ethernet on your phone? I explain why you shouldn't turn your wifi router on, and why you shouldn't turn your phone into a hotspot. It's shocking how unsafe it makes your location.
FOLLOW UP VIDEO! • WHY Snowden Says Don’t...
Resources from the video:
USB-C to ethernet adapter:
amzn.to/2lOVBoy
Lightning to ethernet adapter:
amzn.to/3nCr7BO
Wigle.net provides an amazing resource for WiFi mapping. They also respect the privacy of anyone who requests their information to be removed from the database. To have records of your access point removed from their database send an email to: WiGLE-admin[at]WiGLE.net (please include BSSID (MAC) in removal requests).
Also, append the tag ‘_nomap’ or ‘_optout’ to your SSID to stop other website tracking your location.
HUGE thank you to everyone on Reddit and Twitter who answered my questions about this, and the article on osintcurio which was super helpful!
osintcurio.us/2019/01/15/trac...
Where you can find me:
Cointr.ee/NaomiBrockwell
Recommended Books:
Permanent Record - Edward Snowden
amzn.to/305negc
What has the government done to our money - Rothbard
amzn.to/2KMzmcu
Naomi's Privacy Bag: some of my favorite products to help protect your privacy!
Use the Brave browser! brave.com/nao076
Faraday bag wallet (signal stopping, to protect your fob, credit card, and phone)
amzn.to/2SUkPhu
Data Blocker (if you're charging your phone in an unknown port, use this so that no data is transferred)
amzn.to/2SVh0J2
Computer privacy screen (use your computer in public? Keep your information safe!)
amzn.to/2SXYHmf
Phone privacy screen (don't let people in public see your private data)
amzn.to/2YyJMnH
Camera cover (for computers and phones, so no one can access your camera without you knowing)
amzn.to/2Mt7Hic
My Amazon Wish List
www.amazon.com/hz/wishlist/ls... - Věda a technologie
Watch my recent followup video, responding to comments on this video! czcams.com/video/BWsanzmrnTM/video.html
these devices can contain malicious code.
Beautiful
Ok thanks 😘 czcams.com/video/fPslvBVqJp8/video.html
Btw.. I never knew you were in a music video with Snowden before beautiful mama. Lol 🤣 Take care my friend czcams.com/video/JawRInQ-0fw/video.html
What about your system if it's connected to T Mobile Galaxy wireless internet tower?
“Just because you're paranoid doesn't mean they aren't after you.”
lol, That's a double taker...
So then you won't mind me comming to your house every day to read your personal mail i guess..
Just because you aren't paranoid, doesn't mean they aren't after you
@@VigoTheCarpathian83 way to live up to your name.
@@JoeBlac Well.. this is indeed a reference to Nirvana - Territorial Pissing song. Seems that you are the clueless one xD
Orwell:
“Truth is treason in the empire of lies.”
So why not speak your truth openly instead of trying to hide?
@@spiralviper8158 because treason means death dummy... it means it's a crime, frowned upon, not liked by the government etc.
@@jackthetoiletbowlgamer weigh up the cost yourself i suppose. if you can be coerced by use of the threat of death, then you can be controlled by those doing the coercing. in the bigger picture for the path of societies, such ease of being flattened can drive the establishment of dictatorships, as it did in the 20th century. personally, i'm happy to have nothing to fear from death and take satisfaction in my immunity to any attempts at control by others.
@@spiralviper8158 yea but one voice and death matters not if there is no revolt.. if you sign your death warrant before anything starts they already won.
@@jackthetoiletbowlgamer good point, its good to act relative to what else is happening in the surroundings. I don't know, I'm a nonconformist and wouldn't necessarily join a revolt but refuse to support fascism. I don't mind death but that's me
As my Networking 101 instructor said: "There is no privacy on a network."
Among us
@Nicolae Florin Pașca that is security. privacy is about the data and information of users collected and then send to 'big brother'..
All you can do is mitigate it....never private in the truest sense.
Think about the definition of network.
Privacy does not exist. Not joking. Even when you think you are alone, no electronics, no people, you aren't.
"Ethernet is superior because it doesn't have a MAC Address"... LOL. MAC Addresses were invented for Ethernet cards.
Yap that is correct. Every network hardware have a MAC. Low level packets and protocols work based on MAC. Stuff like ARP
@@raresandrei7205 I can concur as a computer engineer who studied computer networks.
You can't get Internet without one.
The cord doesn't tell the router where to connect because it would completely fall apart if you had a switch in-between the router and device. Also, the device MAC is never transmitted outside the LAN. These sites only record MACs of APs. Please add a correction.
@@DavidStringham 100% correct. There is no purpose of having a MAC address outside of the LAN, except maybe seeing what vendor it is in a support situation.
I’m not worried about people looking at my location. I’m worried about the Boston Dynamic robots knowing my location
I wasn't worried about that until I watched black mirror.... we're screwed, huh?
how do you think the Boston robot will find you? using this precisely 🧐
Not to use wifi, everyone that visit this page is on wifi.
@@hunterhemingway just go watch Black mirror and you will understand. The comment is dystopian hyperbole stated in euphemistic sarcasm, relax.
@@Bcr3106 didn't realize I was freaking out, lol. I used an emoji with a spectacle. Maybe you should relax. I know all about black mirror friend. Working on tech that people constantly compare to that show. I was simply stating a very obvious situation.
Not everyone needs your "protection" on youtube.
I would imagine if you asked Google to not publish your SSID they might remove you from the public facing map ... but they would NEVER remove you from their database. Also, what if you set your WiFi Router to NOT transmit an SSID? I assume they can still pick you up as you are still broadcasting a WiFi signal.
Great point
Your Access Point has to transmit the SSID/BSSID or WiFi stops working. You can stop advertising the SSID, but it remains visible to anyone sniffing the WiFi traffic. Security through obscurity is insecure.
Well yeah how else could they know not to readd you again? /s
ANd yes if you turn off broadcasting the SSID then you still broadcast the WiFi. Anyone sniffing can detect hidden APs like that. It IS more secure but only by such a small margin it often doesn't even bear consideration.
@@SuperWolfkin I would say its often more secure. Why target them when there's 10 more in range that are openly broadcasting
If can get apps like Wifi Analyzer (and similar) for Android devices (last I recall Apple does not allow this) and you'll be able to see any/all broadcasting devices within range of your Android device.
Allow your AP to broadcast, capture the BSSID. Disable your AP. Do an active scan for wireless networks - if you BSSID is not present, that would lean towards zero broadcasting is occurring.
When you perform a check of this nature, be sure to check both 2.4GHz and 5GHz.
That is why MAC address randomization is enabled by default
I laughed at your description of having a "clunky" device attached to your phone connected to a long cord. It was just called a phone 20 years ago.
phunny phunny
Landline. Works great.
She is talking about twenty years ago connections ,then wireless arrived we all trilled for using laptops and mobile phones every where with no wire connections, except charging.20 years later admiring and realising .our privacies to go back to old tech again. So sad that all wireless tech exploided
I was just thinking that.
I was like... yeah, it's called a phone.... hell, they used to be stuck to walls too...I guess that was the cordless version, pre-corded, and pre cordless-phone
@Daniel Prohonas HAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA, yea they were! YOu can stop a burglar with that shit!
This takes stalking to a whole different level
oh absolutely
Yep...land of the free my ass
Yeah no s*** ask all my ex-girlfriends from the past 20 years since AOL broadband came out an I used to use the 2000 hour AOL CDs delivered in the mail every single day...🤜🤛😂😂😂🤘😝
Antonio .Valencia an important tool for all the loser gangstalkers out there
No this stops the stalkers ( government does stalking operations , individuals do not )
Snowden also said remove all the microphones from your phone and use one you have to physically plug in when you want the phone to hear you.
A purposeful misunderstanding of computer science to fit a scare tactic narrative.
For instance 'A WiFi BSSId, also known as a MAC address..."
In the next breath ...
"A wired connection doesn't need a MAC address".
Priceless...
Plus, if you aren't using a hotspot then they can't identify you through anything. If you are at your bar or work or home and you need internet but don't have wifi for your laptop, THERE WILL BE NO ETHERNET
@MrNicks24 I thought it was google play cards... Even so, you will still have a mac address in the LAN on each port.. i.e. Each nic has a unique mac address which is used to direct packets locally (on the lan)
it is obviously false that wired connections do not use MAC addresses, but I do not understand what that has to do with scare tactics
@Mr Helpful I am the joker
@@userjhansen3197 you can use usb tethering but this video is just stupid in general
Just so everyone knows the Internet is just one big bugging devise.
Started by NSA/CIA types
100%
In the book 1984 the two-way view screens weren't voluntary. Silly George Orwell, people will pay to have them!
@No No1
According to Edward snowden, if you search something censored and illegal on internet then NSA firewall is triggered and NSA store your query in its database. Because they put backdoor in popular products like (whatsapp, facebook, google, windows) that give them access to our devices. And classify all that our data with their automated AI Classification algorithms. That create profile of a person and then that data is added to their Private internet with multiple connected servers. Where they can get all information (government/Criminal records, personal details, technology usage, his views ) of a person just by typing his name or any similar search. And then create hard backup copy of that data.
Snowdens' job was to bring down the NSA whilst still working for the C I.. A.
Rename your wifi router to "FBI VAN1"
Or NSA listening post
I started collection SSID's and I have many screen captures, Including the ONE you mentioned. There are many of them everywhere.
@liluglydude I've even seen DOJ, FBI Surveillance Van & some funny one's too. One said "All Cops Are Bastards" about 1 mile from the PD. On the main road. I have a long collection.
What is the name of that van they get running around which sends out a signal and all the calls in the area go through it? Police have them.. Oh I remember.. Stingray.. this is your town police stingray..
liluglydude we named our router FBI Surveillance. 😂
The Question is not are you paranoid, the Question is are you paranoid enough.
@Bike & Outdoor Germany Did you just quote the movie Strange Days? Nice! I always remember Michael Madsen reciting that line in the movie.
@@gryphon509 ;)
You can be paranoid all you want. If you're online, you're tracked.
Question is are u worthy enough for somebody to track you?
This is one area where Android has a big privacy advantage over iOS - the default hotspot SSID on Android is a very generic "AndroidAP", which at any given moment there a millions of active. Makes it just the bit more difficult to narrow down a specific person's location via hotspot usage (obviously not impossible, but much harder than "NAME's iPhone").
Also, as informative as this video is, it's also a double-edged sword in a sense, since it makes (currently) ~1 million people aware of these ways to track people who *may* not have had any idea it was possible. 🤔
Yet apple has 90% of apple users data.
When she said having a cord in a phone is weird, I felt old...
Wait until she finds out some phones hang on the wall and never move.
Yes. I still own an old dial front phone with cord, but not using it. My parents still use theirs though.
I remember The Phone Company coming to the house and servicing the phone.... replacing the 2lb microphone and earpiece speaker, rewiring a new coiled cord, replacing the dial disk that had the pohone number rubber stamped on it ( they had the changeable stamp on the toolbelt. You need this service annually, because the microphone would get fouled with cigarette smoke buildup. Sound quality on analog was rich, not flat. Cost 50 cents a minute to call across the street, if you lived on the very edge of a particular calling "area". You sent signals to others, so they could call you back, free... half ring, one ring, one and a half rings.... or the Cap'n Crunch Whistle
I remember getting the 30-foot coily cord for our wall phone.... It could reach all the way to the bathroom! My sister used it for "boyfriend" calls! AH! The good old days...
Bro she old as hell lmao
and yet we can't get back our stolen phones 🤦♂️
well, save the MAC address
Same goes for laptops, even if you have your MAC, or some pinging app on your device. I heard this from several people who had their electronics stolen, police doesn't give a flying f*ck.
lmao 😔
Excellent comment! A-mazing! I live in France and got stolen my phone recently...And been told that they can not localize my phone. Not to mention that the police with all those surveillance cameras on every corner (medieval city) couldn't bother to find it either! Talked to other people ... the same thing. These cameras don't serve a thing.
+Strukle D I've seen french police watch and not intervene while tourists were getting scammed.
In most European cities, police is swamped by crime, so they prioritize, and theft of an old phone is low on the list. Same for the prosecutor's office, so even if the thief was arrested, he'll never appear in court.
I'm in the Netherlands, criminals are openly selling drugs in front of cameras, in front of cops, nobody cares. Police will not show up for shoplifting of items under 15 EU. The percentage of successful prosecution for theft and break-ins is single digits. Half of the rape cases are dropped by the prosecutor. In total, 50,000 cases were dropped in 2017, on a population of 17 million.
A cop recently complained on twitter that some man punched him in the face, he arrested him but saw him walking around a few hours later. My guess is he was undocumented, those are never prosecuted, so, in practice, above the law.
Only when firearms are involved are they successful, 95% of such cases are solved. For everything else they may even refuse to file your complaint, as I've experienced. There was a scandal recently when a report came out, police whistleblowers said their bosses forced them to refuse complaints, mis-file them, to manipulate crime statistics.
Thank you for taking the time to research and share this!
Nowadays these privacy concepts should be in the primary school curriculum as soon as kids gain access to the Internet...
However, there are a few technical mistakes in the way you explained these concepts... i.e. even if you gain access to my WiFi network, you still have to break into my PC security later ("smart" home and tablet/mobile phones are a lot easier apparently)
I just found and like your channel. This episode was very good. Suggestion: in addition to waving around the piece of equipment, slow it down and actually demonstrate an installation (simulation). It would be very helpful. Thank you.
welcome!
These days cars are constantly connected to LTE wireless.
If my car is at home, I'm at home. It is effortless for them to track all my away-from-home activities, my whole schedule basically...
And with full self-driving coming soon - they could just drive you into a wall, or over a cliff, if they want.
Let's be very clear: do you have a mobile phone constantly turned on ?
They have a record of where you were for the past 10+ years every 5 minutes.
@@autohmae Nope, I don't own a mobile phone. I'm probably among the last on Earth to not own one. 😁
But I have an LTE-connected EV - probably among the first on Earth. So they have me captured after all... 😱
@@rwess if you are very technical talk from linux.conf.au 2019 about an idea of a FPGA phone. We really need to change the architecture of phones and the network (he's also into mesh networking).
By "they", do you mean our government? You're likelier to be attacked by someone not associated with any agency. If it's a major operation, it will likely be by social engineering. It's the easiest and most favorable way to attack. Convince cops someone is hostile, and they'll shoot. Convince someone that you're an executive, and you can walk in and out with company secrets. Convince someone that they're a mechanic, and they can have exclusive access to your car, and install backdoors to stage a suicide. People want to believe everyone is who they say they are, and what they seem to be. Cybernetic attacks are glamorous, but social engineering attacks are in nearly all cases more practical. The chance of success is much greater, and the risks are few to none.
You might as well give up and just end it foolish thing.
It's almost like the internet was designed to be this way!! haha!
When the Internet "a harddisk" was the size of a refrigirator and very expensive, logging information wasn't really invented yet.
Not to use wifi, everyone that visit this page is on wifi.
As a design principle TCP/IP, the communication standard of the Internet, was primarily an effort to work reliably. No thought was spent on security at the time. The inventors have said if they could do it over again they would have made security a primary effort and reliability a close second.
Yep
It was!
I just found you, love your accent and commentary. Good job and good luck.
Thanks for watching!
try using an extension cable between the device and the adapter. 1. longer cord before the dongle, and 2. the adapter wont be what is plugged and unplugged/jiggled about. So you can replace the extension cord instead of the adapter when its end wears out
Wait what? MAC addresses are used in all network connections, no matter which physical medium is used. They are part of Layer 2 of the OSI model. WiFi/Ethernet are part of Level 1.
Right, but the wired MACs are not broadcast for everyone, and are not otherwise visible through a layer-3 router.
You can imagine people in a crowd wanting to talk to one another.
The movement of air (speech) would be the physical layer (layer 1) and addressing would be done over a data-link (layer 2) by using someones name (eg. a MAC).
Someone yell's out the person's name (and everyone hears it being "broadcasted") -- now everyone knows there's someone in the crowd named "steve".
Thank you for referring to the OSI
Plus, if you aren't using a hotspot then they can't identify you through anything. If you are at your bar or work or home and you need internet but don't have wifi for your laptop, THERE WILL BE NO ETHERNET
@@userjhansen3197 "if you aren't using a hotspot then they can't identify you through anything" thats not true at all if you take a look at wifi discover etc.
My preferred set-up and the one I've been using at home for years now is to build my own router (a dedicated PC with server/workstation parts and multiple NIC's and dedicated network switches as needed). I like to use bridge mode on my ISP provided modem/router which I then feed directly into my home router/firewall running OpenBSD. I separate the network into different subnets which are firewalled off from each other. It's been especially useful this past year since working from home so there's no chance my works computer can see my own computers and my home network remains secure. It's really stable and runs really nicely, and is not too hard or expensive to set up.
While that is a great setup and it sounds interesting. It doesn't seem to have anything to do with WiFi or the inherent vulnerability therein.
@@SuperWolfkin There are some things that cannot be overcome, at least not easily, but that doesn't mean we give up and stop trying. We can implement whatever measures we can where we can. Security must be multilayered if it's to be effective. One layer may prove to be ineffective, or at least less effective but we should still study and dowhatvwe can in the understanding the other layers should help.
may i ask whered u learn that from? lots of tech savy ppl here that id like to learn from
Hi you can use auxilary cable for type c, it will reduce weight of bulky circuit
Thanks for sharing! I think those are very useful tips for anyone living in this era! While no precautions I know of will "completely" hide you from say, the police, certain measures will indeed keep you safer from hackers and nosy civilians - or at least give those people a much harder time. Given how easy it is for anyone who's curious to track you these days, online privacy is definitely an issue. Nice job!
I’m going back to pigeons and smoke signals. Na telepathy is still good.
Telepathy is the most organic non Gmo natural way.
Telepathy is only secure if you remember to wear your tinfoils hat whenever you aren't intentionally recieving or transmitting. Otherwise, the psychic vampire alien elves can read your mind.
Ravens...
@@johns9478 not mine! I pushed the SAP button! Take that pinko/Bolshevik mind readers!
@@johns9478 "Hello, Mr Anderson."
This could be used to someone’s advantage. Leave your devices behind while committing crimes
You don't have to proof innocence. Your device being somewhere is not enough to proof your alibi.
The only effect is the prosecutor has to use some other way to proof your guilt, not based on your device. You know, like they did 20yrs ago...
*CIA, FBI, NSA......
Tungst the way things are today your pretty much guilty until you can prove your innocence. The phone will show them you we’re at the scene of the crime and the time and if you made contact with someone. If someone was going to do something I agree it would be wise to leave it behind.
True that,unless your a member off the demacraps..or i should say a member of the demacraps
@@whatfreedom7 I didn't state it wouldn't incriminate you when you actually do something illegal like your example.
If you are guilty until proven otherwise you should reconsider the country you live in.
I bought an rj45 but was not sure how to use and your video was helpful, so I'm subbed now thanks!
Thanks for the sub!
Question: can the device be used with a lightning extender? That way you could keep the device further away and just have a plug as if it was charging.
I heard somewhere that the post office knows exactly where you live🤭
On a side note I ordered an Ethernet cable from Amazon and it should arrive soon. 🤗
🤣 100% true.
I am not a Postman btw 🤣
ROFL 🤣
Sounds dangerous. Don't use your home address for mail but get a Post Office box instead. Less convenient having to go to the box to get your mail, but much more secure! ;-)
@@macsnafu Sadly not all mail can be sent to a post box including using a redirect service. Some items have a do not redirect on them, they are usually government IDs, credit cards and such, most of which at least where I live no longer support boxes outside of extreme cases. Besides since the post office is government ran and since the government knows where you live anyways what's the point in hiding from them?
@@egg-roll8968 It was a joke--not a serious suggestion.
Mac addresses can be changed/masked/cloned so, i wouldn't say they "never" change, they are.. not supposed to change. but they change.
back a few years that may be true. but now even that can be backtracked
My NICs on my desktops has a section for me to change the MAC to whatever I want. I'm not sure if that's a one time use or what though.
Why is this only wifi? The way I think it should work and the way it actually works isn't the same :/ I send out a request for google.com. My service provider gave me a DHCP address with my particular cable modem. Why are my internal MAC addresses sent out? How come it doesn't create a random internal ID and keep that only internally and map it separately from the DHCP address from the service provider. I don't like the idea of a big map with history available on it for anyone to look at.
Aleph Gates oh my god, my head hurts trying to understand what you’re saying.
DHCP assigns a logical/“virtual” IP address to a physical MAC address on an internal local network (think home). This is your “internal ID”. When you make a request to Google, your computer tries to connect to Google’s IP. As your network doesn’t have that IP, the request is sent to your router and up to your service provider from your external IP. The request receiver (Google) only sees your external IP, not your internal one.
WiFi works differently and lives entirely on your local network. The reason the MAC address of the WiFi access point can be detected is because the MAC address is used to establish communication between the computer and the WiFi access point. That means people need to be physically near to be able to detect your Access Point’s MAC and SSID.
Aleph Gates In essence, what I’m trying to say is: how you think it works IS actually how it works. Your knowledge is just patchy and you’re not seeing the whole picture.
I saw the video once but I didn't catch if using WIFI was similar to using your phones data in terms of security. Or is using data more similar to using ethernet cord? Or data usage is unique from both?
I installed an app firewall on my Android phone. When I deny internet to "Anonymous usage statistics" it also denies internet access to critical Android processes. When I enable those critical proceses again, it also restores internet to the statistics spyware.
"A phone with a big cord attached to the wall" How retro!
A cordless phone with a cord
Just a quick note for iPhone and iPad users. Apple doesn't allow apps to scan for wifi networks around you (they can still get your networks name) and since iOS and iPadOS 14 your mac address gets randomized on every network that you connect to. This means that you are a little safer but if you can you should still use an ethernet port.
Great video btw
I did connect the ethernet cable directly from my Verizon to my router, then my router aquired the ip address works better using my asus ax11000 with their own vpn , open vpn, ipsec and more. I dis stop the use of modems since I was with the cable company. Nice video 👍
I have one of these too! Ex sysadmins now consultant and this has helped me out many times
Doesn't this mean that the main problem is Google et al using phones and other devices as spyware?
Then storing our info in China?
unsettling that this doesn't have more likes....
The fact that they are able to use our devices as spyware means the capability was built in to them in the first place.
yes... that is indeed part of the problem... the other problem being folx allowing it to happen without taking to the streets... and continuing to buy/use these products... and many of us, have known these facts for years. For example look at the many things Aaron Schwartz used to say.
So once you know the problem, the real thing is coming up with solutions... this video offers one good and powerful example of a solution as best practices...
What are some other solutions?
yes , privately owned devices at that.
Here's what we do. Swap our routers every month. It could become a festival
Lmfaoo Router Fest 😂
Or randomize your mac ....
Plot twist nsa up their game on cable
I like to pass messages to my neighbors with my wifi router, like, get_off_my_lawn...or impeach_trump. LOL Sorry for that last one. I couldn't help myself!!
@@ricsanders69 Ikr, my routers current name is liberals_are_idiots! 😂😂
There are ways to change the MAC #/BSSID of a device and every Network adapter in a PC also has a fixed MAC # unless you use a special app to change it.
i have just came across your page and your videos are fantastic , really informative and most of all sticking it to the man . love ,peace, hugs and thanks .
I really appreciate that!
@@NaomiBrockwellTV deserved keep it up 💚
I need to stress this real quick as someone who's getting their associates in computer science: it is 100% impossible to fully protect yourself online. :/
4nt IK if you wanna be safe from the government you have to get off the grid
4nt At least that's what you're supposed to think.
Smitty well than its not a usable laptop now is it
EREX98 IG you got rid of all WiFi etc would the wireless electricity meter do any spying? We also have a WiFi one on our water meter which is in our basement
every little step that makes spying on me harder is something I want to do. I can be robbed, but I make it as hard as possible for people to do so
If you use WiFi, enable mac address filtering. You specify which devices can access the router, and it blocks all others.
Unfortunately spoofing a MAC address is trivial, so this isn't really a strong security measure.
To bad it doesn't work anymore on modern smartphones, those have randomized MAC-addresses, for privacy.
Best bet is to not use wifi, then use a firewall and then a VPN
autohmae No, phones don't do that. The only one I've seen was on my Xiaomi with a custom rom that had a bug, so it randomized the MAC at every reboot. Normally the MAC is always the same (unless you spoof it). The only time they randomize MAC is while searching for available APs
@@lubomirbrousek194 I don't know much about it, but that sounds about right. In the router interface, you can usually set mac filters.
Good video. question. if you have a vpn on your phone, does it add to security if you use it as a hotspot?
When I connect my mobiles through a repeater then they are listet in my router as LAN Connected, is this better or still the same problem?
Go ahead. Spy on me. See if I care. You're the one who's going to need counseling after seeing my browser history.
That's the spirit.
@@mochipii No, this atitude is exactly the problem. People like him think they are the target, that it is it is all about him, and that is fine if it was true, but in 99.99% of the cases it is not true. Most people are very low on the priority list. They are followers, rather then go in first. They should not care about privacy because of what _they_ are doing, but because others who _are_ doing something that ultimately matters to everyone have enough of a sea of confusion around that the criminals in the top cannot find them.
He should care about his privacy, because it would protect the next Snowden or Julian Assange. There is something nasty and selfish about saying "come spy on me, there is nothing to find here and I don't care," we are not at the point yet where we should say that because we have the enemy down. We don't have the enemy down, the enemy is keeping good people in prison which we may not be able to rescue before they get murdered.
By the way, the real worry is not that anyone can find where you have been, although that certainly is also a worry, but the biggest worry seems to me that the ruling class can start categorizing and analyzing everyone, and eventually when the time is right for them (read; they have created their war and the panic to ratify it), they could start acting upon this mass of data they have. These consequences will likely start ranging from newspapers not supporting honest candidates in politics and always supporting criminals and corruptible people, to refusing people for all kinds of jobs, to harassment and murder. This may seem weird to some people, but it would be very weird if it did not happen sooner or later, because it ends always the same with the Roman Republic and its unstable power centralizing economic system.
Lol
Pornh,*b as always 😂
Shadow Cadet Kami .. hi Kami , do VPN’s protect from viruses or do you still need antivirus
Pro-Tip: Use a VPN located in the Netherlands, they have laws against record keeping and spying on users.
Lol. I don't think a spy agency follows laws...
@@christophergood2314 Yes obviously spy agencies break "laws" perhaps you misunderstood the point. Whereas US companies are mandated to KEEP logs vis-vis the PATRIOT ACT, companies in the Netherlands are not bound by the PATRIOT Act nor any national law mandating they keep records and thus opt to NOT keep logs as a matter of business choice.
@@LibertyTalkFM I see your point. Thanks good to know.
Cleared up an issue that had crossed my mind.
Thanks, both of you!
If you connect to the VPN wirelessly, your location is known regardless of VPN.
Only thing the VPN does for you, is encrypt your data.
Not finished the video, but could you USB tether your phone to a rasp pi zero W, and have that device connect to wifi? Spoofing the MAC on that would be easier (worst case you swap out the rasp pi), and let you monitor/control connections. Plus a rasp pi zero is only a bit bigger than the dongle. I guess you need a battery to run it too, but you could also make a phone case that integrates it and the case.
I don't know if that wigle site was changed since the video aired, but I can't see any SSID's when I zoom in on the map. Tried with multiple browsers.
And when I click to filter to wifi hotspots seen within the past year or two, the map becomes pretty barren. ;)
Thanks for the heads up, Naomi !
I'm easy to find - DE:AD:BE:EF:CA:FE
5 downvotes from the NSA. Great advice, thanks :)
lolol 👀
Keanu Chun NSA could give a shit about your WiFi...if it’s in America or used by citizens.
Can I use two of these adapters to create a link between to mobile device and through it give one acces to the internet?
Your MAC address is still present over Ethernet. It has to be present to be a part of the network.
yeah in your private network until you enter the internet. then it's your routers mac and nobody can create a map of your smartphones positions by your router information...
The Government and Google knows I've been looking at porn for a long time
YES!!! I'm sure they found out by now... ALL men do, if they say they don't they're a damn lie
Me too
That's actually funny!!
Wtf
Yup all people who have nothing better to do watch poem. Losers.
Can we go back to when we didn't have celluar devices......meaning if i'm not at home.....leave a damm message !!!
Ravioli 23 .......No. 🚬😎
Yea like if I ain't By the fukn land line I'm uncontactable and untraceable
Ravioli 23 that’s completely up to you!
Why do you want everyone else disconnected tho??
@@missdirection4616 - Celluar devices are taking away from families QT time, people stealing info, little kids getting fooled & sexually attack by predators, just so much krazy stuff on our little hand held compact computer / telephone !!!
Ravioli 23 so you don’t think this place is a sorting process and the internet is helping categorize individuals??
Very informative and not a little 😱
I use a 3m cable to charge my phone this gives me plenty of mobility so can't I not add an inline adaptor so the " clunky bit"😂 can be at the 3m end?
Do you have a video on smartphone modification for security? Like, I never use Wi-Fi and I can stop using Bluetooth but I'm having a hard time finding out if I can just open my phone and remove the wifi and Bluetooth and cameras and microphones without doing something special. Will simply removing those devices cause my phone to malfunction?
Your Ethernet port has a MAC address too, and the router keeps track of it. Also, you can "spoof" MAC addresses =]
it's like having an electric car, with an extension cord, lol
the BSSID can be changed in some routers. Also, many mobile phones also have a default setting to use random MAC addresses now.
random mac addresses can definitely help in some cases.
If you have regular wifi issues, you either have a physical issue (wifi device / Lan cable), too many neighbouring WiFi points or you need QoS setup.
As an IT engineer I'll say this - The average person shares too much via Facebook, so implementing this doesn't help them much. They're better off with a solid endpoint antivirus, firewall like Untangle & firmware updates for all networking devices.
Thanks for this. I’m curious about fire stick linked to Amazon can I do something to protect me from whatever may happen Amazon owns everything
@@hvdb4492 no. About all you can do via fire stick is install a VPN. But that doesn't protect you from Amazon. It only hides what you view on your fire stick from your ISP.
can I challange zuckerberg to an athletic event?
What most people don't realize is that Facebook is the Public Version of a US Military DARPA Project called LifeLog which had the objective of collecting a persons entire life into a Database...
“Don’t use WiFi” ya good luck with that.
Mr. 8-Bit Doggo not practical? You need to seriously reassess your perspectives if you feel sacrificing first world conveniences, and indulgent user comforts is too impractical for you, over invaluable privacy and anonymity then your in trouble
JoshPhoenix11 Using the internet outside of the home is more than a luxury; it's necessary for some people. I don't know how many places with Wi-Fi are going to let you plug your ethernet cable in.
JoshPhoenix11 So why have you not moved in with the Amish.
Mr. 8-Bit Doggo Exactly besides most people aren’t doing things to catch the governments eye.
If you're a serious gamer, you already have your PC connected via wired connection. So you just need to do the same for other devices.
I appreciate your content. Network security is going to be a very important aspect of our futures.
If I even have new home built, I will have it pre-wired with eithernet cables throughout the home. Question, what are concerns of running a WiFi network if live in a rural area?
Wow how comforting that someone is looking after me. I thought I was all alone.
Haha brilliant.
But you are.
So who here watching this video using Wi-Fi / tethering?
Errrr everyone?
Yes! My neighbor's Wi-Fi.
Password is 88888888.
Doh!
that must be laggy
not me
"it is a little clunky" - holds up a brick of an iPhone
MAC isn't static, easily changeable on basically any router...
yeah but once you do that ISP won't give you a connection untill you report the changed mac address
@@markjohnson1155 That's such a bummer really, if that wasn't the case we could all simply run a script and make these maps pointless.
@@markjohnson1155 Ofc they will, otherwise your new router would never be able to get any signal. I changed my MAC address countless times and always got a new IP and connection
....And once you go out on public and your phone starts connecting to cell towers, you become trackable once again. Congratulations.
Use airplane mode.
@@annieesther8405 Then I won't need a phone service either. Oh, the money I will save. No pesky calls or texts to deal with either. Bonus!
Does anybody else remember the time when all our phones were connected to the wall and we actually had to go outside and talk you know she just described that right
Payphones still exist, I use them! Find an intercity bus or train station, or go to the airport!
yes. as a boy on the farm, we had one of those. ''a Landline '' nowadays, it is known as. Back then (60's) if a family member picked off the phone, from the wall, and heard 2 people chatting, it was called a ' party line '''.........which, today is known as WI-FI..........and, as Telly Savalas used to say in his movies..''' you've come a long way, baby...."" good day to all....WORK safe.
Yeah pretty boring time. And im 2000 born and dont bother to try to conviece me.
@@deleted9821 what?
nope. never heard of it. call BS on that!
What if your modem and wireless router are housed together. Is there a way to disable the WiFi router and leave the modem active?
I would ask, what about block of flats - in one of them could be many networks - of course there still is MAC adress and if someone knows it, network can be connected with particular person. But without the information localisation don't say anything - is that correct?
As a real expert with 35 years of experience, I can honestly say that Snowden isn’t wrong. However, your analysis and breakdown is horribly flawed. I’d start with researching MAC addresses and see where that leads.
Yes thank you, also this video seems to ignore that from just your IP adres online services can make a very good estimate whee you are located. Maybe not as precise as GPS, but still close enough.
Even if your phone or computer is connected by cable, if a malicious app starts to sniff network traffic, etc. Even with a cable you are at risk.
There is a problem that basically any app can get your ssid and read wifi networks close by (not sure if network scanning is a permission you have to enable manually).
But let's not pretend just using a cable is automatically safe.
At least we have a sane induvidual in this comment section hehe!
lol who walks around with there phone perma tethering and wan ip already has close to precise location, more wifi is as safe as your router there is no diff between the wifi and lan port connection thru the router and did i hear correctly about the mac address? i have seen duplicate mac addresses in my time as a network admin so it's not completely unique lol
If someone already knows your eSSID, you're already pwned completely. They can be assumed to have full access to your system, able to just pop open a browser and find a stored address (i.e. pop open Google Maps). Ethernet doesn't make anything better, in fact, it would be worse since there's no standardized data link encryption.
What was even the point of this video? People have been blasting microwaves as loud as obnoxious bassheads with their car stereos at night. This is nothing new, and such a defense is easy to defeat. Just find the one tin-foil hat guy who actually plugs their phone into a Cat6 cable with a dongle and correlate it to the house without Wi-Fi.
@@DerekSmit Unlikely with a VPN.
I've been trying to tell people for years to use ethernet instead of wifi, they thought I was crazy until now
The Art Of Tech Support oh no! We're still pretty sure you're bat shit kookoo for Koko puffs. Just thought you should know
@Mr. 8-Bit Doggo oh, I was just messing with you. You're absolutely right. I've read about how the Rockefellers got their hands in medicine just do they could sell us snake oil, made from oil, while at the same time, kicking home remedies that worked, out the door
Who knew I’m smart to ya no
skindian6669 u2 Yep, reading about that right now in a book called The Truth About Cancer.
@Mr. 8-Bit Doggo 18 !! That's minimal I think. TY for the article. Will look it up.
When you use your phones data, is it actually connecting to any nearby wifi network. Including the home wifi that other individuals pay for?
When you use data the phone connects to the cell phone towers set up by your phone company, so if you never use wifi (which doesn't use data) you might be fine.
Will it confuse my phone that I don’t take out that I always leave it at home even when I go out I don’t take my mobile phone with me because I know it tracks me so I just leave it in the same place all the time
Her bangs alone could block wifi signals. Got to get me one of those.
I’m impressed by how well she explains this even though she has learned about this so recently
she doesnt, it just seems that way because you dont know that much about it.
some of the things she says just arent true. some much so that I get the idea she's making a buck of the adapter she's promoting.
have a look at wigle.net install the app. see what it does with your own eyes.
it does what your phone is doing right now
Exactly the same, only difference is it takes notes. it registers what it has seen.
you will need another app to see some things, like network strength, but your phone DOES have the capability to see that. It just doesnt show you
also have a look at the wifi pineapple its a hacking device. it does some of the things she claims wigle does
I have Wigle, had it since 2017. it DOESNT show who is connected to a network. My pineapple nano does though
I checked the map where i live.. In my very small part of the town there is none.. Only in the more populated area.. And it seems to follow the roads.
So i dont know how accurate this is..
Great video. Really helpful💯 & thanks for the info👍💛
Glad you liked it!!
"Holding a phone, and trying to use a phone that has a big cord coming out of it attached to the wall..."
I'm middle aged, so I've been doing that all my life! LMAO!!!
try one with a spiral, springy cord that keeps wanting to pull the phone back towards the wall like on a rubber band...do we miss the 70s and 80s? no
Dejavu all over again...
@@genkiferal7178 and a rotary dial.
Oh yeah, Google's "High Accuracy" location mode. I never use it and never needed to use it.
Wait until 5G is everywhere. Your location will be able to be pinpointed simply by having it on the network.
All mobile phones have unique IMEI numbers, the only way is to keep your phone in a mylar bag rendering it useless.
you can do that now. being on a network is like being on an address.
dont need to wait for 5G
have a look at what wigle does, a lot of the info in the viddy is bad.
@DrawOfTheCards many phones have a small backup battery that is still working with the main battery removed. I saw a video somewhere where they showed your how to open up your phone and cut that part out. The mylar bag is the only way to prevent any signal from getting through.
@@mr.c9820 for a short while i used that to see when my roommate was home...i got stupid and he found out and changed him name so i could no longer tell. I thought he was trying to break into my room, so tried to shower or go shopping when I knew he wasn't home
5G will never be everywhere. It's only good for certain applications.
I have to add to the beginning of the video that routers do technically have a firewall, but only a simple one and by definition, at least in Germany, they are not sufficient for this purpose, especially for companies, because you need to have full control over what you can block and I learned that some routers don't offer this possibility, they always have standard ports like 80 and 443 open, so normal users don't run into problems if they block them by mistake.
Thanks, Naomi, for explaining that so a non-technical person could understand it. I appreciate the time and preparation it took.
Hi Naomi. Thanks for your advice.
My question: When selecting the SSID and going to settings, one can enter tab MAC address type.
This provides option to either 1. Select and use the device MAC or 2. Select and use the default - randomised MAC.
If it's already using a "randomised MAC" does it not mean it's as secure as using your proposed Ethernet device or is this not secure? Thanks
My Wi-Fi is set to set not discoverable can only access it through manually entering the details and my network provider has supplied me with an application designed for router management it's like a two step verification any new connection I need to verify on my device in the application I can also view the full connection request history and I do have nordVPN does this offer any level of protection for me?? And if anybody replies to this thank you
This was a really informative video, thank you very much!
Useful information, as always. Gonna change SSID to Naomi Brockwell if you don't mind.
We are all Naomi! We are all satoshi!
lolol
That'll confuse anyone trying to find out where she lives... there's so many Naomi Brockwell's ! :D :D
@@prosuja4314 .... satoshi .... you've just given me a great idea :D
@@maaifoediedelarey4335 And what idea is that?
I have a prepaid cellphone on my boat...in case it catches on fire or starts sinking. I've never had to use it. Once in a while I have to charge it. That's the full extent of my cellphone use. :)
If I plug my computer or cell phone to my router, what shuts off the wifi? I have used Ethernet/modem connection and never had an issue. So now I'm confused...
There's no option to delete apps on this LG Stylo5-none. Any suggestions?
Starting from android 6, it's mandatory to start the gps signal to be able to use bluetooth. That is a privacy breach that was built in all the android phones and that every strange app can scan the exact location of that bluetooth device or wifi device ! All the privacy laws say that you need the expres agreement of the user to publish personal data, and the wifi name or SSID is personal data. As its not open to the wide public ! At the end, where is our privacy enforced by the laws ? There is no more privacy ! 😔
We can all move back to the woods and become hunter-gatherers.
You are possibly new to this planet. There was a long period of time in between humanities transition from hunter-gathers to the invention of wi-fi
@@davidlean8674 You did not understand my comment.
Nah I can't live without my fast food sorry
@@veryconfused9768 Ever tried catching a chicken? Now that is really fast food.
@@registerme2 I am vegetarian brother I don't eat chicken(ー_ー゛)
Vegetarian food is also in fast food,you know that super oily but still can't get enough food.
Ethernet is vulnerable too: most US ISPs track geolocation via IP of your cable modem at the building. So, you are located already despite transport type.
Why can't the router regularly change the MAC/BSSID it broadcasts?
What I can't wrap my head around is how you'd know what devices are connected unless you have access to the router/AP... Also, when I look at that map and it's displaying for like the last 10 years (only lived in this place for 3) there is no information for this neighborhood at all. I see devices in my little town but not the neighborhood I live in.