Advanced Look at How to Stay Away from Tracking Lists

Streamed on:
10.8K

As discussed in the last video, the main threat that most people are not aware of is the relationship map which is created mostly from email and app contact lists. This is a hard concept to understand because of the constant prodding by Big Tech to use 2FA.

So we are going to address some more advanced concepts. For example, does Signal and Telegram protect your contact lists? How about De-Googled Phones vs normal phones for 2FA? Lots of misunderstanding here because there are different threats involved. Government vs Big Tech. They have different access so this can get confusing.

The final solution is just to write these down as fixed rules to follow and avoid overthinking it.

Loading 28 comments...