Live Stream 2 - How to become "invisible" online

Streamed on:
159

In this livestream, we are going to get a better look at the nature of surveillance and how it works. The sections will be:

> Telemetry and its uses (and dangers)
> Tracking
> Profiling
> Methods of Protection
> Hardware Level
> Software Level
> Good and Best Practices

References to all computer Operating Systems, like Windows, macOS, and Linux.

In short, we will talk about how something seemingly benign can become a threat.

Find me in the following social media:
TRUTH SOCIAL: @vasileios

GETTR: @realvasileios

GAB: @vasileiosk

Loading 2 comments...