* You Are At Risk If You Haven't Done This * Every Operating System Comes With Various Default Settings. Those Default Settings Guide How Your Given Operating System Handles Files, Links, Networking. Today Sharing A Story Of How A Deanonymization Attack Could Go Down, And How To Protect Yourself.
Example: Are What Is Your Default Application To Open Links? If It's Not Tor Browser / I2P, You Will Make A Direct Connection And Could Be Manipulated Into Exploitation.
*Let's Talk About It!*
Whether running a Linux desktop, Mac, Android, iPhone, or Windows laptop, your default apps will guide how your device handles links.
If you received a link within an encrypted messenger, or social media, have you ever accidentally clicked on the link? Or do you always remember to right click / open within another app?
You will benefit by refining your default applications, and gain the peace of mind knowing your system won't make those direct connections, creating an online safety risk.
Share the video to educate, spread awareness, and help strengthen the networks upon which transparency / journalism depend.
We have seen various stories over the years, millions and millions of dollars invested into trying to break the privacy / security / anonymity of innocent people around the world.
#tor #i2p #anonymous
SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL
Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!
*Thanks for sharing this and all videos. It's a HUGE help reposting these videos!*
*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)
*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*
Join me today in this. Leave a comment, share a thought.
EMAIL: righttoprivacy[at]
tutanota.com / righttoprivacy[at]
i2pmail.org
(VIDEO SHARED EARLY ON PUBLIC BLOG:
https://bmc.link/politictech)
*Watch, And Share With Others!*
I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
If you learn something here, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)
💻 LAPTOP (coreboot / Intel ME neutered):
https://bmc.link/politictech/commissions (options)
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
CASHAPP -
https://cash.app/$HumanRightsTech
MEMBERSHIP:
https://bmc.link/politictech/membership (early / exclusive / more)
SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻
**PUBLIC BLOG:**
https://bmc.link/politictech/posts
First shared on public blog:
https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]
tutanota.com
📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)