Snowden says don't use Wifi, I explain why

Sdílet
Vložit
  • čas přidán 27. 09. 2019
  • Snowden said this week:
    "I wouldn't use WiFi at home, because global maps of every wireless access point's unique ID-including yours-are free and constantly updated. I would use ethernet; yes, ethernet on a phone."
    Using ethernet on your phone? I explain why you shouldn't turn your wifi router on, and why you shouldn't turn your phone into a hotspot. It's shocking how unsafe it makes your location.
    FOLLOW UP VIDEO! • WHY Snowden Says Don’t...
    Resources from the video:
    USB-C to ethernet adapter:
    amzn.to/2lOVBoy
    Lightning to ethernet adapter:
    amzn.to/3nCr7BO
    Wigle.net provides an amazing resource for WiFi mapping. They also respect the privacy of anyone who requests their information to be removed from the database. To have records of your access point removed from their database send an email to: WiGLE-admin[at]WiGLE.net (please include BSSID (MAC) in removal requests).
    Also, append the tag ‘_nomap’ or ‘_optout’ to your SSID to stop other website tracking your location.
    HUGE thank you to everyone on Reddit and Twitter who answered my questions about this, and the article on osintcurio which was super helpful!
    osintcurio.us/2019/01/15/trac...
    Where you can find me:
    Cointr.ee/NaomiBrockwell
    Recommended Books:
    Permanent Record - Edward Snowden
    amzn.to/305negc
    What has the government done to our money - Rothbard
    amzn.to/2KMzmcu
    Naomi's Privacy Bag: some of my favorite products to help protect your privacy!
    Use the Brave browser! brave.com/nao076
    Faraday bag wallet (signal stopping, to protect your fob, credit card, and phone)
    amzn.to/2SUkPhu
    Data Blocker (if you're charging your phone in an unknown port, use this so that no data is transferred)
    amzn.to/2SVh0J2
    Computer privacy screen (use your computer in public? Keep your information safe!)
    amzn.to/2SXYHmf
    Phone privacy screen (don't let people in public see your private data)
    amzn.to/2YyJMnH
    Camera cover (for computers and phones, so no one can access your camera without you knowing)
    amzn.to/2Mt7Hic
    My Amazon Wish List
    www.amazon.com/hz/wishlist/ls...
  • Věda a technologie

Komentáře • 5K

  • @NaomiBrockwellTV
    @NaomiBrockwellTV  Před 3 lety +39

    Watch my recent followup video, responding to comments on this video! czcams.com/video/BWsanzmrnTM/video.html

    • @ilovebass879
      @ilovebass879 Před 3 lety +2

      these devices can contain malicious code.

    • @Coram_D30
      @Coram_D30 Před 2 lety

      Beautiful

    • @mikeg9277
      @mikeg9277 Před 2 lety

      Ok thanks 😘 czcams.com/video/fPslvBVqJp8/video.html

    • @mikeg9277
      @mikeg9277 Před 2 lety

      Btw.. I never knew you were in a music video with Snowden before beautiful mama. Lol 🤣 Take care my friend czcams.com/video/JawRInQ-0fw/video.html

    • @billschindler1381
      @billschindler1381 Před 2 lety

      What about your system if it's connected to T Mobile Galaxy wireless internet tower?

  • @Mike.C.
    @Mike.C. Před 4 lety +2472

    “Just because you're paranoid doesn't mean they aren't after you.”

    • @scarakus
      @scarakus Před 4 lety +51

      lol, That's a double taker...

    • @stephenkingking7634
      @stephenkingking7634 Před 4 lety +32

      So then you won't mind me comming to your house every day to read your personal mail i guess..

    • @RoulDukeGonzo
      @RoulDukeGonzo Před 4 lety +75

      Just because you aren't paranoid, doesn't mean they aren't after you

    • @JoeBlac
      @JoeBlac Před 4 lety +3

      @@VigoTheCarpathian83 way to live up to your name.

    • @thrive5985
      @thrive5985 Před 4 lety +24

      @@JoeBlac Well.. this is indeed a reference to Nirvana - Territorial Pissing song. Seems that you are the clueless one xD

  • @skiz0tt915
    @skiz0tt915 Před 4 lety +597

    Orwell:
    “Truth is treason in the empire of lies.”

    • @spiralviper8158
      @spiralviper8158 Před 4 lety +3

      So why not speak your truth openly instead of trying to hide?

    • @jackthetoiletbowlgamer
      @jackthetoiletbowlgamer Před 4 lety +13

      @@spiralviper8158 because treason means death dummy... it means it's a crime, frowned upon, not liked by the government etc.

    • @spiralviper8158
      @spiralviper8158 Před 4 lety +4

      @@jackthetoiletbowlgamer weigh up the cost yourself i suppose. if you can be coerced by use of the threat of death, then you can be controlled by those doing the coercing. in the bigger picture for the path of societies, such ease of being flattened can drive the establishment of dictatorships, as it did in the 20th century. personally, i'm happy to have nothing to fear from death and take satisfaction in my immunity to any attempts at control by others.

    • @jackthetoiletbowlgamer
      @jackthetoiletbowlgamer Před 4 lety +3

      @@spiralviper8158 yea but one voice and death matters not if there is no revolt.. if you sign your death warrant before anything starts they already won.

    • @spiralviper8158
      @spiralviper8158 Před 4 lety +1

      @@jackthetoiletbowlgamer good point, its good to act relative to what else is happening in the surroundings. I don't know, I'm a nonconformist and wouldn't necessarily join a revolt but refuse to support fascism. I don't mind death but that's me

  • @paulmchone
    @paulmchone Před 3 lety +551

    As my Networking 101 instructor said: "There is no privacy on a network."

    • @raijin7707
      @raijin7707 Před 3 lety +6

      Among us

    • @79maanz
      @79maanz Před 3 lety +21

      @Nicolae Florin Pașca that is security. privacy is about the data and information of users collected and then send to 'big brother'..

    • @paulpyatt9942
      @paulpyatt9942 Před 3 lety +10

      All you can do is mitigate it....never private in the truest sense.

    • @yooootoooober
      @yooootoooober Před 3 lety +4

      Think about the definition of network.

    • @kinginblack1120
      @kinginblack1120 Před 3 lety +13

      Privacy does not exist. Not joking. Even when you think you are alone, no electronics, no people, you aren't.

  • @gregyoung9687
    @gregyoung9687 Před 3 lety +1172

    "Ethernet is superior because it doesn't have a MAC Address"... LOL. MAC Addresses were invented for Ethernet cards.

    • @raresandrei7205
      @raresandrei7205 Před 3 lety +127

      Yap that is correct. Every network hardware have a MAC. Low level packets and protocols work based on MAC. Stuff like ARP

    • @midimistro
      @midimistro Před 3 lety +47

      @@raresandrei7205 I can concur as a computer engineer who studied computer networks.

    • @DavidStringham
      @DavidStringham Před 3 lety +42

      You can't get Internet without one.

    • @DavidStringham
      @DavidStringham Před 3 lety +118

      The cord doesn't tell the router where to connect because it would completely fall apart if you had a switch in-between the router and device. Also, the device MAC is never transmitted outside the LAN. These sites only record MACs of APs. Please add a correction.

    • @unicornshampoo
      @unicornshampoo Před 3 lety +29

      @@DavidStringham 100% correct. There is no purpose of having a MAC address outside of the LAN, except maybe seeing what vendor it is in a support situation.

  • @u2ooberboober
    @u2ooberboober Před 4 lety +2430

    I’m not worried about people looking at my location. I’m worried about the Boston Dynamic robots knowing my location

    • @Bcr3106
      @Bcr3106 Před 4 lety +73

      I wasn't worried about that until I watched black mirror.... we're screwed, huh?

    • @hunterhemingway
      @hunterhemingway Před 4 lety +44

      how do you think the Boston robot will find you? using this precisely 🧐

    • @condorX2
      @condorX2 Před 4 lety +36

      Not to use wifi, everyone that visit this page is on wifi.

    • @Bcr3106
      @Bcr3106 Před 4 lety +28

      @@hunterhemingway just go watch Black mirror and you will understand. The comment is dystopian hyperbole stated in euphemistic sarcasm, relax.

    • @hunterhemingway
      @hunterhemingway Před 4 lety +15

      @@Bcr3106 didn't realize I was freaking out, lol. I used an emoji with a spectacle. Maybe you should relax. I know all about black mirror friend. Working on tech that people constantly compare to that show. I was simply stating a very obvious situation.
      Not everyone needs your "protection" on youtube.

  • @digiacomtech5589
    @digiacomtech5589 Před 3 lety +61

    I would imagine if you asked Google to not publish your SSID they might remove you from the public facing map ... but they would NEVER remove you from their database. Also, what if you set your WiFi Router to NOT transmit an SSID? I assume they can still pick you up as you are still broadcasting a WiFi signal.

    • @NaomiBrockwellTV
      @NaomiBrockwellTV  Před 3 lety +8

      Great point

    • @mrtechie6810
      @mrtechie6810 Před rokem +15

      Your Access Point has to transmit the SSID/BSSID or WiFi stops working. You can stop advertising the SSID, but it remains visible to anyone sniffing the WiFi traffic. Security through obscurity is insecure.

    • @SuperWolfkin
      @SuperWolfkin Před rokem +4

      Well yeah how else could they know not to readd you again? /s
      ANd yes if you turn off broadcasting the SSID then you still broadcast the WiFi. Anyone sniffing can detect hidden APs like that. It IS more secure but only by such a small margin it often doesn't even bear consideration.

    • @shabadooshabadoo4918
      @shabadooshabadoo4918 Před 11 měsíci +1

      @@SuperWolfkin I would say its often more secure. Why target them when there's 10 more in range that are openly broadcasting

    • @not12listen
      @not12listen Před 10 měsíci +2

      If can get apps like Wifi Analyzer (and similar) for Android devices (last I recall Apple does not allow this) and you'll be able to see any/all broadcasting devices within range of your Android device.
      Allow your AP to broadcast, capture the BSSID. Disable your AP. Do an active scan for wireless networks - if you BSSID is not present, that would lean towards zero broadcasting is occurring.
      When you perform a check of this nature, be sure to check both 2.4GHz and 5GHz.

  • @BIELSIMON
    @BIELSIMON Před 3 lety +19

    That is why MAC address randomization is enabled by default

  • @themostsecretscience6409
    @themostsecretscience6409 Před 4 lety +862

    I laughed at your description of having a "clunky" device attached to your phone connected to a long cord. It was just called a phone 20 years ago.

    • @mouthpiece200
      @mouthpiece200 Před 4 lety +10

      phunny phunny

    • @alaricvisigoth919
      @alaricvisigoth919 Před 4 lety +28

      Landline. Works great.

    • @aynurskene7231
      @aynurskene7231 Před 4 lety +15

      She is talking about twenty years ago connections ,then wireless arrived we all trilled for using laptops and mobile phones every where with no wire connections, except charging.20 years later admiring and realising .our privacies to go back to old tech again. So sad that all wireless tech exploided

    • @fleshybits
      @fleshybits Před 4 lety +5

      I was just thinking that.
      I was like... yeah, it's called a phone.... hell, they used to be stuck to walls too...I guess that was the cordless version, pre-corded, and pre cordless-phone

    • @livingstonseagull2465
      @livingstonseagull2465 Před 4 lety +2

      @Daniel Prohonas HAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA, yea they were! YOu can stop a burglar with that shit!

  • @mad24mob
    @mad24mob Před 4 lety +190

    This takes stalking to a whole different level

    • @weareallbeingwatched4602
      @weareallbeingwatched4602 Před 4 lety +4

      oh absolutely

    • @davidstephens6959
      @davidstephens6959 Před 4 lety +11

      Yep...land of the free my ass

    • @jaysmith2151
      @jaysmith2151 Před 4 lety +1

      Yeah no s*** ask all my ex-girlfriends from the past 20 years since AOL broadband came out an I used to use the 2000 hour AOL CDs delivered in the mail every single day...🤜🤛😂😂😂🤘😝

    • @chakkakon
      @chakkakon Před 4 lety +4

      Antonio .Valencia an important tool for all the loser gangstalkers out there

    • @studiodevelopers2467
      @studiodevelopers2467 Před 4 lety +1

      No this stops the stalkers ( government does stalking operations , individuals do not )

  • @itchykami
    @itchykami Před 3 lety +15

    Snowden also said remove all the microphones from your phone and use one you have to physically plug in when you want the phone to hear you.

  • @Microblitz
    @Microblitz Před 3 lety +76

    A purposeful misunderstanding of computer science to fit a scare tactic narrative.
    For instance 'A WiFi BSSId, also known as a MAC address..."
    In the next breath ...
    "A wired connection doesn't need a MAC address".
    Priceless...

    • @userjhansen3197
      @userjhansen3197 Před 3 lety

      Plus, if you aren't using a hotspot then they can't identify you through anything. If you are at your bar or work or home and you need internet but don't have wifi for your laptop, THERE WILL BE NO ETHERNET

    • @Exposingscammers
      @Exposingscammers Před 3 lety +1

      @MrNicks24 I thought it was google play cards... Even so, you will still have a mac address in the LAN on each port.. i.e. Each nic has a unique mac address which is used to direct packets locally (on the lan)

    • @lescitrons
      @lescitrons Před 3 lety +1

      it is obviously false that wired connections do not use MAC addresses, but I do not understand what that has to do with scare tactics

    • @lescitrons
      @lescitrons Před 3 lety

      @Mr Helpful I am the joker

    • @FirstnameLastName-mr8lk
      @FirstnameLastName-mr8lk Před 2 lety

      @@userjhansen3197 you can use usb tethering but this video is just stupid in general

  • @davidparker4501
    @davidparker4501 Před 4 lety +555

    Just so everyone knows the Internet is just one big bugging devise.

    • @scarter176
      @scarter176 Před 4 lety +17

      Started by NSA/CIA types

    • @alexjohnson8331
      @alexjohnson8331 Před 4 lety +6

      100%

    • @joshuacoppersmith
      @joshuacoppersmith Před 4 lety +43

      In the book 1984 the two-way view screens weren't voluntary. Silly George Orwell, people will pay to have them!

    • @127.
      @127. Před 4 lety +14

      @No No1
      According to Edward snowden, if you search something censored and illegal on internet then NSA firewall is triggered and NSA store your query in its database. Because they put backdoor in popular products like (whatsapp, facebook, google, windows) that give them access to our devices. And classify all that our data with their automated AI Classification algorithms. That create profile of a person and then that data is added to their Private internet with multiple connected servers. Where they can get all information (government/Criminal records, personal details, technology usage, his views ) of a person just by typing his name or any similar search. And then create hard backup copy of that data.

    • @fortnitefred1351
      @fortnitefred1351 Před 4 lety +7

      Snowdens' job was to bring down the NSA whilst still working for the C I.. A.

  • @AtomkeySinclair
    @AtomkeySinclair Před 4 lety +604

    Rename your wifi router to "FBI VAN1"

    • @johnsanchez9980
      @johnsanchez9980 Před 4 lety +46

      Or NSA listening post

    • @UZI9MMAUTO
      @UZI9MMAUTO Před 4 lety +5

      I started collection SSID's and I have many screen captures, Including the ONE you mentioned. There are many of them everywhere.

    • @UZI9MMAUTO
      @UZI9MMAUTO Před 4 lety +28

      @liluglydude I've even seen DOJ, FBI Surveillance Van & some funny one's too. One said "All Cops Are Bastards" about 1 mile from the PD. On the main road. I have a long collection.

    • @LivelysReport
      @LivelysReport Před 4 lety +9

      What is the name of that van they get running around which sends out a signal and all the calls in the area go through it? Police have them.. Oh I remember.. Stingray.. this is your town police stingray..

    • @michaelcoffey2706
      @michaelcoffey2706 Před 4 lety +7

      liluglydude we named our router FBI Surveillance. 😂

  • @bikeoutdoorgermany7385
    @bikeoutdoorgermany7385 Před 3 lety +148

    The Question is not are you paranoid, the Question is are you paranoid enough.

    • @gryphon509
      @gryphon509 Před 3 lety +1

      @Bike & Outdoor Germany Did you just quote the movie Strange Days? Nice! I always remember Michael Madsen reciting that line in the movie.

    • @bikeoutdoorgermany7385
      @bikeoutdoorgermany7385 Před 3 lety +1

      @@gryphon509 ;)

    • @alterego157
      @alterego157 Před 3 lety +1

      You can be paranoid all you want. If you're online, you're tracked.

    • @wdkpwr6586
      @wdkpwr6586 Před 3 lety

      Question is are u worthy enough for somebody to track you?

  • @mattm7220
    @mattm7220 Před 3 lety +9

    This is one area where Android has a big privacy advantage over iOS - the default hotspot SSID on Android is a very generic "AndroidAP", which at any given moment there a millions of active. Makes it just the bit more difficult to narrow down a specific person's location via hotspot usage (obviously not impossible, but much harder than "NAME's iPhone").
    Also, as informative as this video is, it's also a double-edged sword in a sense, since it makes (currently) ~1 million people aware of these ways to track people who *may* not have had any idea it was possible. 🤔

    • @CB-ur8zy
      @CB-ur8zy Před 2 lety

      Yet apple has 90% of apple users data.

  • @SirPream
    @SirPream Před 3 lety +310

    When she said having a cord in a phone is weird, I felt old...

    • @johndii2194
      @johndii2194 Před 3 lety +21

      Wait until she finds out some phones hang on the wall and never move.

    • @followeroftheway8454
      @followeroftheway8454 Před 3 lety +4

      Yes. I still own an old dial front phone with cord, but not using it. My parents still use theirs though.

    • @citylockapolytechnikeyllcc7936
      @citylockapolytechnikeyllcc7936 Před 3 lety +6

      I remember The Phone Company coming to the house and servicing the phone.... replacing the 2lb microphone and earpiece speaker, rewiring a new coiled cord, replacing the dial disk that had the pohone number rubber stamped on it ( they had the changeable stamp on the toolbelt. You need this service annually, because the microphone would get fouled with cigarette smoke buildup. Sound quality on analog was rich, not flat. Cost 50 cents a minute to call across the street, if you lived on the very edge of a particular calling "area". You sent signals to others, so they could call you back, free... half ring, one ring, one and a half rings.... or the Cap'n Crunch Whistle

    • @rusty1187
      @rusty1187 Před 3 lety +5

      I remember getting the 30-foot coily cord for our wall phone.... It could reach all the way to the bathroom! My sister used it for "boyfriend" calls! AH! The good old days...

    • @steebbo9460
      @steebbo9460 Před 3 lety

      Bro she old as hell lmao

  • @pikachu5647
    @pikachu5647 Před 4 lety +376

    and yet we can't get back our stolen phones 🤦‍♂️

    • @theochampion7229
      @theochampion7229 Před 4 lety +23

      well, save the MAC address

    • @MrTubularBalls
      @MrTubularBalls Před 4 lety +47

      Same goes for laptops, even if you have your MAC, or some pinging app on your device. I heard this from several people who had their electronics stolen, police doesn't give a flying f*ck.

    • @laur-unstagenameactuallyca1587
      @laur-unstagenameactuallyca1587 Před 4 lety

      lmao 😔

    • @strukled8590
      @strukled8590 Před 4 lety +19

      Excellent comment! A-mazing! I live in France and got stolen my phone recently...And been told that they can not localize my phone. Not to mention that the police with all those surveillance cameras on every corner (medieval city) couldn't bother to find it either! Talked to other people ... the same thing. These cameras don't serve a thing.

    • @MrTubularBalls
      @MrTubularBalls Před 4 lety +26

      +Strukle D I've seen french police watch and not intervene while tourists were getting scammed.
      In most European cities, police is swamped by crime, so they prioritize, and theft of an old phone is low on the list. Same for the prosecutor's office, so even if the thief was arrested, he'll never appear in court.
      I'm in the Netherlands, criminals are openly selling drugs in front of cameras, in front of cops, nobody cares. Police will not show up for shoplifting of items under 15 EU. The percentage of successful prosecution for theft and break-ins is single digits. Half of the rape cases are dropped by the prosecutor. In total, 50,000 cases were dropped in 2017, on a population of 17 million.
      A cop recently complained on twitter that some man punched him in the face, he arrested him but saw him walking around a few hours later. My guess is he was undocumented, those are never prosecuted, so, in practice, above the law.
      Only when firearms are involved are they successful, 95% of such cases are solved. For everything else they may even refuse to file your complaint, as I've experienced. There was a scandal recently when a report came out, police whistleblowers said their bosses forced them to refuse complaints, mis-file them, to manipulate crime statistics.

  • @londonbridgebox
    @londonbridgebox Před 3 lety +10

    Thank you for taking the time to research and share this!
    Nowadays these privacy concepts should be in the primary school curriculum as soon as kids gain access to the Internet...
    However, there are a few technical mistakes in the way you explained these concepts... i.e. even if you gain access to my WiFi network, you still have to break into my PC security later ("smart" home and tablet/mobile phones are a lot easier apparently)

  • @freeradical1567
    @freeradical1567 Před 2 lety +2

    I just found and like your channel. This episode was very good. Suggestion: in addition to waving around the piece of equipment, slow it down and actually demonstrate an installation (simulation). It would be very helpful. Thank you.

  • @rwess
    @rwess Před 4 lety +272

    These days cars are constantly connected to LTE wireless.
    If my car is at home, I'm at home. It is effortless for them to track all my away-from-home activities, my whole schedule basically...
    And with full self-driving coming soon - they could just drive you into a wall, or over a cliff, if they want.

    • @autohmae
      @autohmae Před 4 lety +22

      Let's be very clear: do you have a mobile phone constantly turned on ?
      They have a record of where you were for the past 10+ years every 5 minutes.

    • @rwess
      @rwess Před 4 lety +11

      @@autohmae Nope, I don't own a mobile phone. I'm probably among the last on Earth to not own one. 😁
      But I have an LTE-connected EV - probably among the first on Earth. So they have me captured after all... 😱

    • @autohmae
      @autohmae Před 4 lety +12

      @@rwess if you are very technical talk from linux.conf.au 2019 about an idea of a FPGA phone. We really need to change the architecture of phones and the network (he's also into mesh networking).

    • @danielodors
      @danielodors Před 4 lety +26

      By "they", do you mean our government? You're likelier to be attacked by someone not associated with any agency. If it's a major operation, it will likely be by social engineering. It's the easiest and most favorable way to attack. Convince cops someone is hostile, and they'll shoot. Convince someone that you're an executive, and you can walk in and out with company secrets. Convince someone that they're a mechanic, and they can have exclusive access to your car, and install backdoors to stage a suicide. People want to believe everyone is who they say they are, and what they seem to be. Cybernetic attacks are glamorous, but social engineering attacks are in nearly all cases more practical. The chance of success is much greater, and the risks are few to none.

    • @mccc4559
      @mccc4559 Před 4 lety

      You might as well give up and just end it foolish thing.

  • @polygon2744
    @polygon2744 Před 4 lety +169

    It's almost like the internet was designed to be this way!! haha!

    • @autohmae
      @autohmae Před 4 lety +3

      When the Internet "a harddisk" was the size of a refrigirator and very expensive, logging information wasn't really invented yet.

    • @condorX2
      @condorX2 Před 4 lety

      Not to use wifi, everyone that visit this page is on wifi.

    • @Expert1911
      @Expert1911 Před 4 lety +17

      As a design principle TCP/IP, the communication standard of the Internet, was primarily an effort to work reliably. No thought was spent on security at the time. The inventors have said if they could do it over again they would have made security a primary effort and reliability a close second.

    • @Lonewolf_rider
      @Lonewolf_rider Před 4 lety +1

      Yep

    • @sophroniamason2730
      @sophroniamason2730 Před 4 lety +1

      It was!

  • @robertnash67
    @robertnash67 Před 3 lety +3

    I just found you, love your accent and commentary. Good job and good luck.

  • @deafomega
    @deafomega Před 3 lety

    try using an extension cable between the device and the adapter. 1. longer cord before the dongle, and 2. the adapter wont be what is plugged and unplugged/jiggled about. So you can replace the extension cord instead of the adapter when its end wears out

  • @KanaalMTS
    @KanaalMTS Před 3 lety +85

    Wait what? MAC addresses are used in all network connections, no matter which physical medium is used. They are part of Layer 2 of the OSI model. WiFi/Ethernet are part of Level 1.

    • @gregh7380
      @gregh7380 Před 3 lety +11

      Right, but the wired MACs are not broadcast for everyone, and are not otherwise visible through a layer-3 router.

    • @WilliamLDeRieuxIV
      @WilliamLDeRieuxIV Před 3 lety +2

      You can imagine people in a crowd wanting to talk to one another.
      The movement of air (speech) would be the physical layer (layer 1) and addressing would be done over a data-link (layer 2) by using someones name (eg. a MAC).
      Someone yell's out the person's name (and everyone hears it being "broadcasted") -- now everyone knows there's someone in the crowd named "steve".

    • @apalo70
      @apalo70 Před 3 lety

      Thank you for referring to the OSI

    • @userjhansen3197
      @userjhansen3197 Před 3 lety

      Plus, if you aren't using a hotspot then they can't identify you through anything. If you are at your bar or work or home and you need internet but don't have wifi for your laptop, THERE WILL BE NO ETHERNET

    • @dimitralex1892
      @dimitralex1892 Před 3 lety

      @@userjhansen3197 "if you aren't using a hotspot then they can't identify you through anything" thats not true at all if you take a look at wifi discover etc.

  • @adrianfisher3349
    @adrianfisher3349 Před 3 lety +21

    My preferred set-up and the one I've been using at home for years now is to build my own router (a dedicated PC with server/workstation parts and multiple NIC's and dedicated network switches as needed). I like to use bridge mode on my ISP provided modem/router which I then feed directly into my home router/firewall running OpenBSD. I separate the network into different subnets which are firewalled off from each other. It's been especially useful this past year since working from home so there's no chance my works computer can see my own computers and my home network remains secure. It's really stable and runs really nicely, and is not too hard or expensive to set up.

    • @SuperWolfkin
      @SuperWolfkin Před rokem +3

      While that is a great setup and it sounds interesting. It doesn't seem to have anything to do with WiFi or the inherent vulnerability therein.

    • @adrianfisher3349
      @adrianfisher3349 Před rokem +1

      @@SuperWolfkin There are some things that cannot be overcome, at least not easily, but that doesn't mean we give up and stop trying. We can implement whatever measures we can where we can. Security must be multilayered if it's to be effective. One layer may prove to be ineffective, or at least less effective but we should still study and dowhatvwe can in the understanding the other layers should help.

    • @ragadrd2005
      @ragadrd2005 Před 5 měsíci

      may i ask whered u learn that from? lots of tech savy ppl here that id like to learn from

  • @jitendrapastaria
    @jitendrapastaria Před 2 lety

    Hi you can use auxilary cable for type c, it will reduce weight of bulky circuit

  • @pedrorubini_
    @pedrorubini_ Před 3 lety +8

    Thanks for sharing! I think those are very useful tips for anyone living in this era! While no precautions I know of will "completely" hide you from say, the police, certain measures will indeed keep you safer from hackers and nosy civilians - or at least give those people a much harder time. Given how easy it is for anyone who's curious to track you these days, online privacy is definitely an issue. Nice job!

  • @stevangraovac4646
    @stevangraovac4646 Před 4 lety +145

    I’m going back to pigeons and smoke signals. Na telepathy is still good.

    • @ArcAngle111
      @ArcAngle111 Před 4 lety +3

      Telepathy is the most organic non Gmo natural way.

    • @johns9478
      @johns9478 Před 4 lety +2

      Telepathy is only secure if you remember to wear your tinfoils hat whenever you aren't intentionally recieving or transmitting. Otherwise, the psychic vampire alien elves can read your mind.

    • @WarptTV
      @WarptTV Před 4 lety +1

      Ravens...

    • @skindianu
      @skindianu Před 4 lety

      @@johns9478 not mine! I pushed the SAP button! Take that pinko/Bolshevik mind readers!

    • @TheRealSamPreece
      @TheRealSamPreece Před 4 lety +1

      @@johns9478 "Hello, Mr Anderson."

  • @austinbartose6527
    @austinbartose6527 Před 4 lety +59

    This could be used to someone’s advantage. Leave your devices behind while committing crimes

    • @065Tim
      @065Tim Před 4 lety +9

      You don't have to proof innocence. Your device being somewhere is not enough to proof your alibi.
      The only effect is the prosecutor has to use some other way to proof your guilt, not based on your device. You know, like they did 20yrs ago...

    • @higoten1993
      @higoten1993 Před 4 lety +1

      *CIA, FBI, NSA......

    • @whatfreedom7
      @whatfreedom7 Před 4 lety +5

      Tungst the way things are today your pretty much guilty until you can prove your innocence. The phone will show them you we’re at the scene of the crime and the time and if you made contact with someone. If someone was going to do something I agree it would be wise to leave it behind.

    • @davidstephens6959
      @davidstephens6959 Před 4 lety

      True that,unless your a member off the demacraps..or i should say a member of the demacraps

    • @065Tim
      @065Tim Před 4 lety +2

      @@whatfreedom7 I didn't state it wouldn't incriminate you when you actually do something illegal like your example.
      If you are guilty until proven otherwise you should reconsider the country you live in.

  • @litestreamer
    @litestreamer Před 3 lety +1

    I bought an rj45 but was not sure how to use and your video was helpful, so I'm subbed now thanks!

  • @mr.salamander1399
    @mr.salamander1399 Před 3 lety

    Question: can the device be used with a lightning extender? That way you could keep the device further away and just have a plug as if it was charging.

  • @stevenpataray4557
    @stevenpataray4557 Před 3 lety +148

    I heard somewhere that the post office knows exactly where you live🤭
    On a side note I ordered an Ethernet cable from Amazon and it should arrive soon. 🤗

    • @paulsobu9084
      @paulsobu9084 Před 3 lety +2

      🤣 100% true.
      I am not a Postman btw 🤣

    • @cadnap
      @cadnap Před 3 lety

      ROFL 🤣

    • @macsnafu
      @macsnafu Před 3 lety +7

      Sounds dangerous. Don't use your home address for mail but get a Post Office box instead. Less convenient having to go to the box to get your mail, but much more secure! ;-)

    • @egg-roll8968
      @egg-roll8968 Před 3 lety +1

      @@macsnafu Sadly not all mail can be sent to a post box including using a redirect service. Some items have a do not redirect on them, they are usually government IDs, credit cards and such, most of which at least where I live no longer support boxes outside of extreme cases. Besides since the post office is government ran and since the government knows where you live anyways what's the point in hiding from them?

    • @macsnafu
      @macsnafu Před 3 lety

      @@egg-roll8968 It was a joke--not a serious suggestion.

  • @Carolina_Housing_Solutions
    @Carolina_Housing_Solutions Před 4 lety +76

    Mac addresses can be changed/masked/cloned so, i wouldn't say they "never" change, they are.. not supposed to change. but they change.

    • @SilverTwinkle
      @SilverTwinkle Před 4 lety +2

      back a few years that may be true. but now even that can be backtracked

    • @AluminumHaste
      @AluminumHaste Před 4 lety

      My NICs on my desktops has a section for me to change the MAC to whatever I want. I'm not sure if that's a one time use or what though.

    • @alephgates7519
      @alephgates7519 Před 4 lety

      Why is this only wifi? The way I think it should work and the way it actually works isn't the same :/ I send out a request for google.com. My service provider gave me a DHCP address with my particular cable modem. Why are my internal MAC addresses sent out? How come it doesn't create a random internal ID and keep that only internally and map it separately from the DHCP address from the service provider. I don't like the idea of a big map with history available on it for anyone to look at.

    • @JohnSmith-ze6jm
      @JohnSmith-ze6jm Před 4 lety +1

      Aleph Gates oh my god, my head hurts trying to understand what you’re saying.
      DHCP assigns a logical/“virtual” IP address to a physical MAC address on an internal local network (think home). This is your “internal ID”. When you make a request to Google, your computer tries to connect to Google’s IP. As your network doesn’t have that IP, the request is sent to your router and up to your service provider from your external IP. The request receiver (Google) only sees your external IP, not your internal one.
      WiFi works differently and lives entirely on your local network. The reason the MAC address of the WiFi access point can be detected is because the MAC address is used to establish communication between the computer and the WiFi access point. That means people need to be physically near to be able to detect your Access Point’s MAC and SSID.

    • @JohnSmith-ze6jm
      @JohnSmith-ze6jm Před 4 lety +3

      Aleph Gates In essence, what I’m trying to say is: how you think it works IS actually how it works. Your knowledge is just patchy and you’re not seeing the whole picture.

  • @email2hector
    @email2hector Před 3 lety +1

    I saw the video once but I didn't catch if using WIFI was similar to using your phones data in terms of security. Or is using data more similar to using ethernet cord? Or data usage is unique from both?

  • @Aranimda
    @Aranimda Před 3 lety +1

    I installed an app firewall on my Android phone. When I deny internet to "Anonymous usage statistics" it also denies internet access to critical Android processes. When I enable those critical proceses again, it also restores internet to the statistics spyware.

  • @albertwill8235
    @albertwill8235 Před 4 lety +101

    "A phone with a big cord attached to the wall" How retro!

    • @arod1766
      @arod1766 Před 4 lety +4

      A cordless phone with a cord

  • @fedemtz6
    @fedemtz6 Před 3 lety +15

    Just a quick note for iPhone and iPad users. Apple doesn't allow apps to scan for wifi networks around you (they can still get your networks name) and since iOS and iPadOS 14 your mac address gets randomized on every network that you connect to. This means that you are a little safer but if you can you should still use an ethernet port.
    Great video btw

  • @07Review
    @07Review Před rokem

    I did connect the ethernet cable directly from my Verizon to my router, then my router aquired the ip address works better using my asus ax11000 with their own vpn , open vpn, ipsec and more. I dis stop the use of modems since I was with the cable company. Nice video 👍

  • @genxguy
    @genxguy Před 2 lety

    I have one of these too! Ex sysadmins now consultant and this has helped me out many times

  • @ghollisjr
    @ghollisjr Před 4 lety +185

    Doesn't this mean that the main problem is Google et al using phones and other devices as spyware?

    • @michaelcoffey2706
      @michaelcoffey2706 Před 4 lety +11

      Then storing our info in China?

    • @coolninjabroguy
      @coolninjabroguy Před 4 lety +11

      unsettling that this doesn't have more likes....

    • @riprockenx6592
      @riprockenx6592 Před 4 lety +12

      The fact that they are able to use our devices as spyware means the capability was built in to them in the first place.

    • @wolfe23
      @wolfe23 Před 4 lety +6

      yes... that is indeed part of the problem... the other problem being folx allowing it to happen without taking to the streets... and continuing to buy/use these products... and many of us, have known these facts for years. For example look at the many things Aaron Schwartz used to say.
      So once you know the problem, the real thing is coming up with solutions... this video offers one good and powerful example of a solution as best practices...
      What are some other solutions?

    • @ossiedunstan4419
      @ossiedunstan4419 Před 4 lety

      yes , privately owned devices at that.

  • @jjk087
    @jjk087 Před 4 lety +245

    Here's what we do. Swap our routers every month. It could become a festival

    • @jayrizzy3307
      @jayrizzy3307 Před 4 lety +27

      Lmfaoo Router Fest 😂

    • @newrevelations3785
      @newrevelations3785 Před 4 lety +22

      Or randomize your mac ....

    • @SameLif3
      @SameLif3 Před 4 lety +1

      Plot twist nsa up their game on cable

    • @ricsanders69
      @ricsanders69 Před 4 lety +16

      I like to pass messages to my neighbors with my wifi router, like, get_off_my_lawn...or impeach_trump. LOL Sorry for that last one. I couldn't help myself!!

    • @damachinen
      @damachinen Před 4 lety +19

      @@ricsanders69 Ikr, my routers current name is liberals_are_idiots! 😂😂

  • @EvilDaveCanada
    @EvilDaveCanada Před 3 lety

    There are ways to change the MAC #/BSSID of a device and every Network adapter in a PC also has a fixed MAC # unless you use a special app to change it.

  • @malonekenny1
    @malonekenny1 Před 2 lety +2

    i have just came across your page and your videos are fantastic , really informative and most of all sticking it to the man . love ,peace, hugs and thanks .

  • @four-en-tee
    @four-en-tee Před 4 lety +409

    I need to stress this real quick as someone who's getting their associates in computer science: it is 100% impossible to fully protect yourself online. :/

    • @erex9875
      @erex9875 Před 4 lety +26

      4nt IK if you wanna be safe from the government you have to get off the grid

    • @tanjafaust
      @tanjafaust Před 4 lety +5

      4nt At least that's what you're supposed to think.

    • @dedsrsngl
      @dedsrsngl Před 4 lety +10

      Smitty well than its not a usable laptop now is it

    • @ElinWinblad
      @ElinWinblad Před 4 lety +4

      EREX98 IG you got rid of all WiFi etc would the wireless electricity meter do any spying? We also have a WiFi one on our water meter which is in our basement

    • @genkiferal7178
      @genkiferal7178 Před 3 lety +21

      every little step that makes spying on me harder is something I want to do. I can be robbed, but I make it as hard as possible for people to do so

  • @johndecicco
    @johndecicco Před 4 lety +60

    If you use WiFi, enable mac address filtering. You specify which devices can access the router, and it blocks all others.

    • @QuadraQuack
      @QuadraQuack Před 4 lety +13

      Unfortunately spoofing a MAC address is trivial, so this isn't really a strong security measure.

    • @autohmae
      @autohmae Před 4 lety +3

      To bad it doesn't work anymore on modern smartphones, those have randomized MAC-addresses, for privacy.

    • @YoungDen
      @YoungDen Před 4 lety +2

      Best bet is to not use wifi, then use a firewall and then a VPN

    • @lubomirbrousek194
      @lubomirbrousek194 Před 4 lety

      autohmae No, phones don't do that. The only one I've seen was on my Xiaomi with a custom rom that had a bug, so it randomized the MAC at every reboot. Normally the MAC is always the same (unless you spoof it). The only time they randomize MAC is while searching for available APs

    • @johndecicco
      @johndecicco Před 4 lety

      @@lubomirbrousek194 I don't know much about it, but that sounds about right. In the router interface, you can usually set mac filters.

  • @mikey803
    @mikey803 Před 3 lety

    Good video. question. if you have a vpn on your phone, does it add to security if you use it as a hotspot?

  • @beka7989
    @beka7989 Před 3 lety

    When I connect my mobiles through a repeater then they are listet in my router as LAN Connected, is this better or still the same problem?

  • @turtlemouth
    @turtlemouth Před 4 lety +834

    Go ahead. Spy on me. See if I care. You're the one who's going to need counseling after seeing my browser history.

    • @mochipii
      @mochipii Před 4 lety +67

      That's the spirit.

    • @josboersema1352
      @josboersema1352 Před 4 lety +114

      @@mochipii No, this atitude is exactly the problem. People like him think they are the target, that it is it is all about him, and that is fine if it was true, but in 99.99% of the cases it is not true. Most people are very low on the priority list. They are followers, rather then go in first. They should not care about privacy because of what _they_ are doing, but because others who _are_ doing something that ultimately matters to everyone have enough of a sea of confusion around that the criminals in the top cannot find them.
      He should care about his privacy, because it would protect the next Snowden or Julian Assange. There is something nasty and selfish about saying "come spy on me, there is nothing to find here and I don't care," we are not at the point yet where we should say that because we have the enemy down. We don't have the enemy down, the enemy is keeping good people in prison which we may not be able to rescue before they get murdered.
      By the way, the real worry is not that anyone can find where you have been, although that certainly is also a worry, but the biggest worry seems to me that the ruling class can start categorizing and analyzing everyone, and eventually when the time is right for them (read; they have created their war and the panic to ratify it), they could start acting upon this mass of data they have. These consequences will likely start ranging from newspapers not supporting honest candidates in politics and always supporting criminals and corruptible people, to refusing people for all kinds of jobs, to harassment and murder. This may seem weird to some people, but it would be very weird if it did not happen sooner or later, because it ends always the same with the Roman Republic and its unstable power centralizing economic system.

    • @darbomusic
      @darbomusic Před 4 lety +2

      Lol

    • @ai.simplified..
      @ai.simplified.. Před 4 lety +3

      Pornh,*b as always 😂

    • @throughthestorm3852
      @throughthestorm3852 Před 4 lety +1

      Shadow Cadet Kami .. hi Kami , do VPN’s protect from viruses or do you still need antivirus

  • @LibertyTalkFM
    @LibertyTalkFM Před 4 lety +177

    Pro-Tip: Use a VPN located in the Netherlands, they have laws against record keeping and spying on users.

    • @christophergood2314
      @christophergood2314 Před 4 lety +51

      Lol. I don't think a spy agency follows laws...

    • @LibertyTalkFM
      @LibertyTalkFM Před 4 lety +49

      @@christophergood2314 Yes obviously spy agencies break "laws" perhaps you misunderstood the point. Whereas US companies are mandated to KEEP logs vis-vis the PATRIOT ACT, companies in the Netherlands are not bound by the PATRIOT Act nor any national law mandating they keep records and thus opt to NOT keep logs as a matter of business choice.

    • @christophergood2314
      @christophergood2314 Před 4 lety +14

      @@LibertyTalkFM I see your point. Thanks good to know.

    • @billyandrew
      @billyandrew Před 4 lety +4

      Cleared up an issue that had crossed my mind.
      Thanks, both of you!

    • @GreatMCGamer
      @GreatMCGamer Před 4 lety +27

      If you connect to the VPN wirelessly, your location is known regardless of VPN.
      Only thing the VPN does for you, is encrypt your data.

  • @inund8
    @inund8 Před 3 lety

    Not finished the video, but could you USB tether your phone to a rasp pi zero W, and have that device connect to wifi? Spoofing the MAC on that would be easier (worst case you swap out the rasp pi), and let you monitor/control connections. Plus a rasp pi zero is only a bit bigger than the dongle. I guess you need a battery to run it too, but you could also make a phone case that integrates it and the case.

  • @slycordinator
    @slycordinator Před 3 lety

    I don't know if that wigle site was changed since the video aired, but I can't see any SSID's when I zoom in on the map. Tried with multiple browsers.
    And when I click to filter to wifi hotspots seen within the past year or two, the map becomes pretty barren. ;)

  • @SpeedRacer-pz9jn
    @SpeedRacer-pz9jn Před 4 lety +26

    Thanks for the heads up, Naomi !
    I'm easy to find - DE:AD:BE:EF:CA:FE

  • @keanu4791
    @keanu4791 Před 4 lety +47

    5 downvotes from the NSA. Great advice, thanks :)

  • @randomdude7386
    @randomdude7386 Před 3 lety

    Can I use two of these adapters to create a link between to mobile device and through it give one acces to the internet?

  • @jasonwalding9402
    @jasonwalding9402 Před 3 lety +5

    Your MAC address is still present over Ethernet. It has to be present to be a part of the network.

    • @dimitralex1892
      @dimitralex1892 Před 3 lety

      yeah in your private network until you enter the internet. then it's your routers mac and nobody can create a map of your smartphones positions by your router information...

  • @Madeintheshade65
    @Madeintheshade65 Před 4 lety +203

    The Government and Google knows I've been looking at porn for a long time

  • @ravioli2389
    @ravioli2389 Před 4 lety +217

    Can we go back to when we didn't have celluar devices......meaning if i'm not at home.....leave a damm message !!!

    • @SaulGoodmun
      @SaulGoodmun Před 4 lety +1

      Ravioli 23 .......No. 🚬😎

    • @alexjohnson8331
      @alexjohnson8331 Před 4 lety

      Yea like if I ain't By the fukn land line I'm uncontactable and untraceable

    • @missdirection4616
      @missdirection4616 Před 4 lety +2

      Ravioli 23 that’s completely up to you!
      Why do you want everyone else disconnected tho??

    • @ravioli2389
      @ravioli2389 Před 4 lety +2

      @@missdirection4616 - Celluar devices are taking away from families QT time, people stealing info, little kids getting fooled & sexually attack by predators, just so much krazy stuff on our little hand held compact computer / telephone !!!

    • @missdirection4616
      @missdirection4616 Před 4 lety

      Ravioli 23 so you don’t think this place is a sorting process and the internet is helping categorize individuals??

  • @jonnyshoestring9368
    @jonnyshoestring9368 Před rokem

    Very informative and not a little 😱
    I use a 3m cable to charge my phone this gives me plenty of mobility so can't I not add an inline adaptor so the " clunky bit"😂 can be at the 3m end?

  • @cheapcigs9772
    @cheapcigs9772 Před 2 lety

    Do you have a video on smartphone modification for security? Like, I never use Wi-Fi and I can stop using Bluetooth but I'm having a hard time finding out if I can just open my phone and remove the wifi and Bluetooth and cameras and microphones without doing something special. Will simply removing those devices cause my phone to malfunction?

  • @ThannMan
    @ThannMan Před 4 lety +17

    Your Ethernet port has a MAC address too, and the router keeps track of it. Also, you can "spoof" MAC addresses =]

  • @danmyself5341
    @danmyself5341 Před 4 lety +18

    it's like having an electric car, with an extension cord, lol

  • @paulrobinson9653
    @paulrobinson9653 Před rokem

    the BSSID can be changed in some routers. Also, many mobile phones also have a default setting to use random MAC addresses now.

  • @zadekeys2194
    @zadekeys2194 Před 3 lety +1

    If you have regular wifi issues, you either have a physical issue (wifi device / Lan cable), too many neighbouring WiFi points or you need QoS setup.

  • @zadekeys2194
    @zadekeys2194 Před 3 lety +28

    As an IT engineer I'll say this - The average person shares too much via Facebook, so implementing this doesn't help them much. They're better off with a solid endpoint antivirus, firewall like Untangle & firmware updates for all networking devices.

    • @hvdb4492
      @hvdb4492 Před 2 lety +2

      Thanks for this. I’m curious about fire stick linked to Amazon can I do something to protect me from whatever may happen Amazon owns everything

    • @DoubleD72
      @DoubleD72 Před rokem +1

      @@hvdb4492 no. About all you can do via fire stick is install a VPN. But that doesn't protect you from Amazon. It only hides what you view on your fire stick from your ISP.

    • @rdshep4873
      @rdshep4873 Před 9 měsíci

      can I challange zuckerberg to an athletic event?

    • @getl0st
      @getl0st Před 27 dny

      What most people don't realize is that Facebook is the Public Version of a US Military DARPA Project called LifeLog which had the objective of collecting a persons entire life into a Database...

  • @alfZbarkada
    @alfZbarkada Před 4 lety +175

    “Don’t use WiFi” ya good luck with that.

    • @JoshPhoenix11
      @JoshPhoenix11 Před 4 lety +22

      Mr. 8-Bit Doggo not practical? You need to seriously reassess your perspectives if you feel sacrificing first world conveniences, and indulgent user comforts is too impractical for you, over invaluable privacy and anonymity then your in trouble

    • @JayAreAitch
      @JayAreAitch Před 4 lety +12

      JoshPhoenix11 Using the internet outside of the home is more than a luxury; it's necessary for some people. I don't know how many places with Wi-Fi are going to let you plug your ethernet cable in.

    • @Toastcat890
      @Toastcat890 Před 4 lety +4

      JoshPhoenix11 So why have you not moved in with the Amish.

    • @Toastcat890
      @Toastcat890 Před 4 lety +2

      Mr. 8-Bit Doggo Exactly besides most people aren’t doing things to catch the governments eye.

    • @user-eu5ol7mx8y
      @user-eu5ol7mx8y Před 4 lety +4

      If you're a serious gamer, you already have your PC connected via wired connection. So you just need to do the same for other devices.

  • @chriszablocki2460
    @chriszablocki2460 Před rokem +6

    I appreciate your content. Network security is going to be a very important aspect of our futures.

  • @RavenwoodAcres
    @RavenwoodAcres Před rokem

    If I even have new home built, I will have it pre-wired with eithernet cables throughout the home. Question, what are concerns of running a WiFi network if live in a rural area?

  • @mammaddenn8010
    @mammaddenn8010 Před 3 lety +54

    Wow how comforting that someone is looking after me. I thought I was all alone.

  • @Mah-LonCreativity
    @Mah-LonCreativity Před 4 lety +110

    So who here watching this video using Wi-Fi / tethering?

  • @KrakkersBB
    @KrakkersBB Před 3 lety +19

    "it is a little clunky" - holds up a brick of an iPhone

  • @kevindsouza7844
    @kevindsouza7844 Před 3 lety +20

    MAC isn't static, easily changeable on basically any router...

    • @markjohnson1155
      @markjohnson1155 Před 3 lety +3

      yeah but once you do that ISP won't give you a connection untill you report the changed mac address

    • @randomrandom316
      @randomrandom316 Před 3 lety

      @@markjohnson1155 That's such a bummer really, if that wasn't the case we could all simply run a script and make these maps pointless.

    • @kevindsouza7844
      @kevindsouza7844 Před 3 lety

      @@markjohnson1155 Ofc they will, otherwise your new router would never be able to get any signal. I changed my MAC address countless times and always got a new IP and connection

  • @chuckstube2
    @chuckstube2 Před 4 lety +17

    ....And once you go out on public and your phone starts connecting to cell towers, you become trackable once again. Congratulations.

    • @annieesther8405
      @annieesther8405 Před 3 lety +1

      Use airplane mode.

    • @joesterling4299
      @joesterling4299 Před 3 lety

      @@annieesther8405 Then I won't need a phone service either. Oh, the money I will save. No pesky calls or texts to deal with either. Bonus!

  • @zakarysmith3253
    @zakarysmith3253 Před 4 lety +106

    Does anybody else remember the time when all our phones were connected to the wall and we actually had to go outside and talk you know she just described that right

    • @annieesther8405
      @annieesther8405 Před 3 lety +2

      Payphones still exist, I use them! Find an intercity bus or train station, or go to the airport!

    • @petersack5074
      @petersack5074 Před 3 lety +1

      yes. as a boy on the farm, we had one of those. ''a Landline '' nowadays, it is known as. Back then (60's) if a family member picked off the phone, from the wall, and heard 2 people chatting, it was called a ' party line '''.........which, today is known as WI-FI..........and, as Telly Savalas used to say in his movies..''' you've come a long way, baby...."" good day to all....WORK safe.

    • @deleted9821
      @deleted9821 Před 3 lety

      Yeah pretty boring time. And im 2000 born and dont bother to try to conviece me.

    • @emostorm7
      @emostorm7 Před 3 lety +2

      @@deleted9821 what?

    • @jzeerod
      @jzeerod Před 3 lety

      nope. never heard of it. call BS on that!

  • @Ptpop
    @Ptpop Před 3 lety

    What if your modem and wireless router are housed together. Is there a way to disable the WiFi router and leave the modem active?

  • @adamasad8083
    @adamasad8083 Před 3 lety

    I would ask, what about block of flats - in one of them could be many networks - of course there still is MAC adress and if someone knows it, network can be connected with particular person. But without the information localisation don't say anything - is that correct?

  • @lordcenaruuk
    @lordcenaruuk Před 3 lety +81

    As a real expert with 35 years of experience, I can honestly say that Snowden isn’t wrong. However, your analysis and breakdown is horribly flawed. I’d start with researching MAC addresses and see where that leads.

    • @DerekSmit
      @DerekSmit Před 3 lety +12

      Yes thank you, also this video seems to ignore that from just your IP adres online services can make a very good estimate whee you are located. Maybe not as precise as GPS, but still close enough.
      Even if your phone or computer is connected by cable, if a malicious app starts to sniff network traffic, etc. Even with a cable you are at risk.
      There is a problem that basically any app can get your ssid and read wifi networks close by (not sure if network scanning is a permission you have to enable manually).
      But let's not pretend just using a cable is automatically safe.

    • @nesy3634
      @nesy3634 Před 3 lety +2

      At least we have a sane induvidual in this comment section hehe!

    • @johanplay
      @johanplay Před 3 lety

      lol who walks around with there phone perma tethering and wan ip already has close to precise location, more wifi is as safe as your router there is no diff between the wifi and lan port connection thru the router and did i hear correctly about the mac address? i have seen duplicate mac addresses in my time as a network admin so it's not completely unique lol

    • @michaellin4553
      @michaellin4553 Před 3 lety

      If someone already knows your eSSID, you're already pwned completely. They can be assumed to have full access to your system, able to just pop open a browser and find a stored address (i.e. pop open Google Maps). Ethernet doesn't make anything better, in fact, it would be worse since there's no standardized data link encryption.
      What was even the point of this video? People have been blasting microwaves as loud as obnoxious bassheads with their car stereos at night. This is nothing new, and such a defense is easy to defeat. Just find the one tin-foil hat guy who actually plugs their phone into a Cat6 cable with a dongle and correlate it to the house without Wi-Fi.

    • @KwaddawK
      @KwaddawK Před 3 lety

      @@DerekSmit Unlikely with a VPN.

  • @TheArtOfTechSupport
    @TheArtOfTechSupport Před 4 lety +43

    I've been trying to tell people for years to use ethernet instead of wifi, they thought I was crazy until now

    • @skindianu
      @skindianu Před 4 lety +5

      The Art Of Tech Support oh no! We're still pretty sure you're bat shit kookoo for Koko puffs. Just thought you should know

    • @skindianu
      @skindianu Před 4 lety +3

      @Mr. 8-Bit Doggo oh, I was just messing with you. You're absolutely right. I've read about how the Rockefellers got their hands in medicine just do they could sell us snake oil, made from oil, while at the same time, kicking home remedies that worked, out the door

    • @SameLif3
      @SameLif3 Před 4 lety

      Who knew I’m smart to ya no

    • @taoist32
      @taoist32 Před 4 lety +1

      skindian6669 u2 Yep, reading about that right now in a book called The Truth About Cancer.

    • @nagomizik9358
      @nagomizik9358 Před 4 lety

      @Mr. 8-Bit Doggo 18 !! That's minimal I think. TY for the article. Will look it up.

  • @mjnc3672
    @mjnc3672 Před 3 lety

    When you use your phones data, is it actually connecting to any nearby wifi network. Including the home wifi that other individuals pay for?

    • @Noissimsarm
      @Noissimsarm Před 3 lety

      When you use data the phone connects to the cell phone towers set up by your phone company, so if you never use wifi (which doesn't use data) you might be fine.

  • @garyjackson583
    @garyjackson583 Před 3 lety

    Will it confuse my phone that I don’t take out that I always leave it at home even when I go out I don’t take my mobile phone with me because I know it tracks me so I just leave it in the same place all the time

  • @belzeebob657
    @belzeebob657 Před 4 lety +7

    Her bangs alone could block wifi signals. Got to get me one of those.

  • @gabrielf8094
    @gabrielf8094 Před 4 lety +52

    I’m impressed by how well she explains this even though she has learned about this so recently

    • @mr.c9820
      @mr.c9820 Před 4 lety +12

      she doesnt, it just seems that way because you dont know that much about it.
      some of the things she says just arent true. some much so that I get the idea she's making a buck of the adapter she's promoting.
      have a look at wigle.net install the app. see what it does with your own eyes.
      it does what your phone is doing right now
      Exactly the same, only difference is it takes notes. it registers what it has seen.
      you will need another app to see some things, like network strength, but your phone DOES have the capability to see that. It just doesnt show you
      also have a look at the wifi pineapple its a hacking device. it does some of the things she claims wigle does
      I have Wigle, had it since 2017. it DOESNT show who is connected to a network. My pineapple nano does though

  • @Alpejohn
    @Alpejohn Před 3 lety

    I checked the map where i live.. In my very small part of the town there is none.. Only in the more populated area.. And it seems to follow the roads.
    So i dont know how accurate this is..

  • @hassanshaadhih2532
    @hassanshaadhih2532 Před 3 lety +1

    Great video. Really helpful💯 & thanks for the info👍💛

  • @amp5334
    @amp5334 Před 4 lety +20

    "Holding a phone, and trying to use a phone that has a big cord coming out of it attached to the wall..."

    • @brianvaughan2624
      @brianvaughan2624 Před 4 lety +6

      I'm middle aged, so I've been doing that all my life! LMAO!!!

    • @genkiferal7178
      @genkiferal7178 Před 3 lety +4

      try one with a spiral, springy cord that keeps wanting to pull the phone back towards the wall like on a rubber band...do we miss the 70s and 80s? no

    • @CJinsoo
      @CJinsoo Před 3 lety

      Dejavu all over again...

    • @marksemple297
      @marksemple297 Před 3 lety

      @@genkiferal7178 and a rotary dial.

  • @AshGreen359
    @AshGreen359 Před 4 lety +9

    Oh yeah, Google's "High Accuracy" location mode. I never use it and never needed to use it.
    Wait until 5G is everywhere. Your location will be able to be pinpointed simply by having it on the network.
    All mobile phones have unique IMEI numbers, the only way is to keep your phone in a mylar bag rendering it useless.

    • @mr.c9820
      @mr.c9820 Před 4 lety +2

      you can do that now. being on a network is like being on an address.
      dont need to wait for 5G
      have a look at what wigle does, a lot of the info in the viddy is bad.

    • @AshGreen359
      @AshGreen359 Před 4 lety

      @DrawOfTheCards many phones have a small backup battery that is still working with the main battery removed. I saw a video somewhere where they showed your how to open up your phone and cut that part out. The mylar bag is the only way to prevent any signal from getting through.

    • @genkiferal7178
      @genkiferal7178 Před 3 lety

      @@mr.c9820 for a short while i used that to see when my roommate was home...i got stupid and he found out and changed him name so i could no longer tell. I thought he was trying to break into my room, so tried to shower or go shopping when I knew he wasn't home

    • @cheryllwaldrop9732
      @cheryllwaldrop9732 Před 3 lety

      5G will never be everywhere. It's only good for certain applications.

  • @ryurenyama
    @ryurenyama Před 3 lety +1

    I have to add to the beginning of the video that routers do technically have a firewall, but only a simple one and by definition, at least in Germany, they are not sufficient for this purpose, especially for companies, because you need to have full control over what you can block and I learned that some routers don't offer this possibility, they always have standard ports like 80 and 443 open, so normal users don't run into problems if they block them by mistake.

  • @auberjean6873
    @auberjean6873 Před 4 lety +4

    Thanks, Naomi, for explaining that so a non-technical person could understand it. I appreciate the time and preparation it took.

  • @agoogleuser3942
    @agoogleuser3942 Před 4 lety +4

    Hi Naomi. Thanks for your advice.
    My question: When selecting the SSID and going to settings, one can enter tab MAC address type.
    This provides option to either 1. Select and use the device MAC or 2. Select and use the default - randomised MAC.
    If it's already using a "randomised MAC" does it not mean it's as secure as using your proposed Ethernet device or is this not secure? Thanks

  • @michaelkerr2005
    @michaelkerr2005 Před 2 lety +1

    My Wi-Fi is set to set not discoverable can only access it through manually entering the details and my network provider has supplied me with an application designed for router management it's like a two step verification any new connection I need to verify on my device in the application I can also view the full connection request history and I do have nordVPN does this offer any level of protection for me?? And if anybody replies to this thank you

  • @oliverhurst7399
    @oliverhurst7399 Před 3 lety +3

    This was a really informative video, thank you very much!

  • @mtemporal
    @mtemporal Před 4 lety +34

    Useful information, as always. Gonna change SSID to Naomi Brockwell if you don't mind.

    • @prosuja4314
      @prosuja4314 Před 4 lety +4

      We are all Naomi! We are all satoshi!

    • @NaomiBrockwellTV
      @NaomiBrockwellTV  Před 4 lety +1

      lolol

    • @pfeerick
      @pfeerick Před 4 lety +2

      That'll confuse anyone trying to find out where she lives... there's so many Naomi Brockwell's ! :D :D

    • @maaifoediedelarey4335
      @maaifoediedelarey4335 Před 4 lety

      @@prosuja4314 .... satoshi .... you've just given me a great idea :D

    • @prosuja4314
      @prosuja4314 Před 4 lety

      @@maaifoediedelarey4335 And what idea is that?

  • @allancrow134
    @allancrow134 Před 4 lety +6

    I have a prepaid cellphone on my boat...in case it catches on fire or starts sinking. I've never had to use it. Once in a while I have to charge it. That's the full extent of my cellphone use. :)

  • @kimlizotte694
    @kimlizotte694 Před rokem

    If I plug my computer or cell phone to my router, what shuts off the wifi? I have used Ethernet/modem connection and never had an issue. So now I'm confused...

  • @nobodysbaby5048
    @nobodysbaby5048 Před 3 lety

    There's no option to delete apps on this LG Stylo5-none. Any suggestions?

  • @SkySky-uj1fk
    @SkySky-uj1fk Před 3 lety +8

    Starting from android 6, it's mandatory to start the gps signal to be able to use bluetooth. That is a privacy breach that was built in all the android phones and that every strange app can scan the exact location of that bluetooth device or wifi device ! All the privacy laws say that you need the expres agreement of the user to publish personal data, and the wifi name or SSID is personal data. As its not open to the wide public ! At the end, where is our privacy enforced by the laws ? There is no more privacy ! 😔

  • @corujariousa
    @corujariousa Před 3 lety +232

    We can all move back to the woods and become hunter-gatherers.

    • @davidlean8674
      @davidlean8674 Před 3 lety +13

      You are possibly new to this planet. There was a long period of time in between humanities transition from hunter-gathers to the invention of wi-fi

    • @corujariousa
      @corujariousa Před 3 lety +21

      @@davidlean8674 You did not understand my comment.

    • @veryconfused9768
      @veryconfused9768 Před 3 lety

      Nah I can't live without my fast food sorry

    • @registerme2
      @registerme2 Před 3 lety +22

      @@veryconfused9768 Ever tried catching a chicken? Now that is really fast food.

    • @veryconfused9768
      @veryconfused9768 Před 3 lety +1

      @@registerme2 I am vegetarian brother I don't eat chicken(ー_ー゛)
      Vegetarian food is also in fast food,you know that super oily but still can't get enough food.

  • @tenminutetokyo2643
    @tenminutetokyo2643 Před 2 lety

    Ethernet is vulnerable too: most US ISPs track geolocation via IP of your cable modem at the building. So, you are located already despite transport type.

  • @LimitedWard
    @LimitedWard Před 3 lety

    Why can't the router regularly change the MAC/BSSID it broadcasts?

  • @diosyntaxa
    @diosyntaxa Před 3 lety +3

    What I can't wrap my head around is how you'd know what devices are connected unless you have access to the router/AP... Also, when I look at that map and it's displaying for like the last 10 years (only lived in this place for 3) there is no information for this neighborhood at all. I see devices in my little town but not the neighborhood I live in.