Author thumbnail

Techlore

Go Incognito: A Guide to Security, Privacy, & Anonymity

525,862 views 60 items Last updated on Aug 23, 2021 public playlist
Go Incognito Premium - Your Best Path to Safety
1:16
Welcome to the Course | Go Incognito 1.1
4:34
Does Privacy & Security Matter? YES! | Go Incognito 1.2
8:32
Security vs Privacy! What's The Difference? | Go Incognito 1.3
4:21
Free & Open Source Software Explained! (FOSS) | Go Incognito 1.4
4:10
The Dangers of Metadata! | Go Incognito 1.5
5:38
The Convenience Line! Your Threat Model | Go Incognito 1.6
3:59
Supporting Go Incognito ๐Ÿ’– | Go Incognito 1.7
2:35
Section 2 Introduction | Go Incognito 2.1
1:27
Minimalism: Less is MORE! | Go Incognito 2.2
8:04
How To Erase Your Digital Local Identity | Go Incognito 2.3
6:25
How To DELETE Your Online Identity | Go Incognito 2.4
11:35
Section 2 Finale | Go Incognito 2.5
1:04
Section 3 Introduction | Go Incognito 3.1
1:36
Keep Your Software Updated! | Go Incognito 3.2
4:01
Permissions and Settings | Go Incognito 3.3
5:49
Most Secure Password Management Explained | Go Incognito 3.4
13:48
Two Factor Authentication Explained | Go Incognito 3.5
6:43
The Most Private Search Engines | Go Incognito 3.6
4:28
What's The BEST Browser? | Go Incognito 3.7
4:27
Hardening Your Browser | Go Incognito 3.8
7:24
Your Browsing Habits | Go Incognito 3.9
5:18
Browser Uniqueness & Fingerprinting | Go Incognito 3.10
4:24
Proxies & VPNs - Are They Good For Privacy? | Go Incognito 3.11
8:19
Antiviruses & Malware - The Truth | Go Incognito 3.12
7:07
How To Delete Files Securely | Go Incognito 3.13
3:53
Secure Storage, File Encryption, & The Cloud | Go Incognito 3.14
5:34
How To Communicate Safely Online | Go Incognito 3.15
8:38
Section 3 Finale | Go Incognito 3.16
1:46
Section 4 Introduction | Go Incognito 4.1
1:27
Privacy & Security of Desktop Operating Systems | Go Incognito 4.2
6:03
Privacy & Security of Mobile Operating Systems | Go Incognito 4.3
7:47
Expendable Operating Systems (VMs & LiveOS) | Go Incognito 4.4
4:51
Tor Explained | Go Incognito 4.5
6:48
Privacy & Security of Cryptocurrencies | Go Incognito 4.6
4:51
Audits - Your Reluctant Privacy Friend | Go Incognito 4.7
4:47
Section 4 Finale | Go Incognito 4.8
1:10
Section 5 Introduction | Go Incognito 5.1
1:18
The Basics of Physical Privacy & Security | Go Incognito 5.2
7:29
MAC Addresses & Privacy Spoofing Explained | Go Incognito 5.3
3:32
Secure Networking Explained | Go Incognito 5.4
5:00
The Privacy-Invasive Radios Around You | Go Incognito 5.5
8:46
Physical Device Separation & Compartmentalization | Go Incognito 5.6
3:50
Section 5 Finale | Go Incognito 5.7
1:32
Section 6 Introduction | Go Incognito 6.1
0:58
Who Can You Trust? | Go Incognito 6.2
5:58
Minimizing Data Access & PII | Go Incognito 6.3
8:14
Pseudonymization & Anonymization | Go Incognito 6.4
4:53
Shopping Privately, Securely, & Safely | Go Incognito 6.5
5:00
Lifestyle Changes for Privacy & Security | Go Incognito 6.6
5:30
Projects That Respect YOU By Default | Go Incognito 6.7
3:17
Downsides of Privacy & Security | Go Incognito 6.8
3:18
Becoming a Privacy Advocate | Go Incognito 6.9
5:02
Section 6 Finale | Go Incognito 6.10
0:52
Course Summary & Recap | Go Incognito 7.1
3:02
Congratulations! | Go Incognito 7.2
1:27
Go Incognito - Behind the Scenes Part 1
2:52
Go Incognito - Behind the Scenes Part 2
3:06
Go Incognito - Behind the Scenes Part 3
3:35
Go Incognito - Behind the Scenes Part 4
4:22