- Видео 283
- Просмотров 28 754 389
All Things Secured
США
Добавлен 10 янв 2016
Easy-to-follow tips and tutorials to help the non-tech savvy person build stronger privacy and security online.
Learn how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more.
Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that.
With the Internet of Things creeping into our daily lives, you can't put it off any longer. Learn the vital skills you need to keep your personal life private and understand best practices as relates to your home network, email, using your mobile phone, etc.
Get started with personal online security here: www.allthingssecured.com/start-here/
Learn how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more.
Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that.
With the Internet of Things creeping into our daily lives, you can't put it off any longer. Learn the vital skills you need to keep your personal life private and understand best practices as relates to your home network, email, using your mobile phone, etc.
Get started with personal online security here: www.allthingssecured.com/start-here/
STOP Using Proton & Signal? Here’s the TRUTH
Are Proton privacy and the Signal messaging app still secure? Every year this gets called into question, yet rarely is the full story ever told. In this video, Josh explains what's really happening with these privacy and security apps as well as how it affects YOU directly.
Watch this video on the 12 privacy and security apps I use EVERY DAY: ruclips.net/video/XNOAOQktG6U/видео.html
YES, I still use and recommend Proton & Signal:
▶ Try Proton Unlimited: www.allthingssecured.com/yt/proton-unlimited
▶ Get the Signal app: signal.org/
If you care about your personal security and privacy online, download my free security checklist here:
✅ Security Checklist: www.allthingssecured.com/security-chec...
Watch this video on the 12 privacy and security apps I use EVERY DAY: ruclips.net/video/XNOAOQktG6U/видео.html
YES, I still use and recommend Proton & Signal:
▶ Try Proton Unlimited: www.allthingssecured.com/yt/proton-unlimited
▶ Get the Signal app: signal.org/
If you care about your personal security and privacy online, download my free security checklist here:
✅ Security Checklist: www.allthingssecured.com/security-chec...
Просмотров: 88 325
Видео
iPhone Mistakes That RUIN Your Privacy
Просмотров 17 тыс.14 дней назад
Just because Apple markets the iPhone as "Private" doesn't mean you get privacy by default. These are the most common mistakes iPhone users make and step-by-step instructions on how to fix it. Be sure to encrypt your cloud storage with Internxt! Get 80% off using code "ATS" here: www.allthingssecured.com/internxt Resources and videos mentioned: ▶ How to turn on Advanced Data Protection: ruclips...
How to PROTECT your photos (4 simple steps)
Просмотров 17 тыс.21 день назад
We keep thousands of photos on our mobile phones and share them in many different ways...but how often do you think about the privacy implications of these pictures? Also, be sure to erase your data on the internet using DeleteMe (20% off): www.joindeleteme.com/allthingssecured Learn more about how DeleteMe works here: ruclips.net/video/PpcZ6VIEVVs/видео.html Other resources mentioned: ▶ Try En...
I Visit Yubico's HQ to investigate the security of 2FA keys
Просмотров 14 тыс.Месяц назад
Can we trust the security companies that help us lock down our online accounts? Josh visits the headquarters of one such company in Stockholm, Sweden to expose how they operate and why we should - or shouldn't - use their products for online security. This video is NOT sponsored ▶ Watch the full interview with the CEO here: ruclips.net/video/8AMsd9fiiSU/видео.html ▶ Get your own YubiKey securit...
12 Privacy & Security Tools I Use EVERY DAY
Просмотров 60 тыс.Месяц назад
12 Privacy & Security Tools I Use EVERY DAY
Testing 5 Secure Email Services | BEST Gmail alternative
Просмотров 58 тыс.2 месяца назад
Testing 5 Secure Email Services | BEST Gmail alternative
The Privacy Community is MAD...here's why (+ my recommendations)
Просмотров 43 тыс.3 месяца назад
The Privacy Community is MAD...here's why ( my recommendations)
NEW Requirements from Google & Yahoo (email security)
Просмотров 36 тыс.3 месяца назад
NEW Requirements from Google & Yahoo (email security)
4 CRITICAL Places to Use a YubiKey (beyond an email account)
Просмотров 66 тыс.4 месяца назад
4 CRITICAL Places to Use a YubiKey (beyond an email account)
Proton CEO explains DANGERS of giving Google your IDENTITY
Просмотров 25 тыс.4 месяца назад
Proton CEO explains DANGERS of giving Google your IDENTITY
Steal my Online Account Security Strategy (ultimate guide)
Просмотров 33 тыс.4 месяца назад
Steal my Online Account Security Strategy (ultimate guide)
I Tested 7 Password Managers: the BEST of 2024 is…
Просмотров 129 тыс.4 месяца назад
I Tested 7 Password Managers: the BEST of 2024 is…
NEW Way to Install VPN on Apple TV in 2024
Просмотров 12 тыс.4 месяца назад
NEW Way to Install VPN on Apple TV in 2024
Privacy is DEAD (+ 7 Privacy Predictions on AI, Quantum & more)
Просмотров 8 тыс.5 месяцев назад
Privacy is DEAD ( 7 Privacy Predictions on AI, Quantum & more)
STOP Using DNA Test Kits! (here's why)
Просмотров 17 тыс.5 месяцев назад
STOP Using DNA Test Kits! (here's why)
Proton CEO answers “What is Blockchain Good For?”
Просмотров 5 тыс.5 месяцев назад
Proton CEO answers “What is Blockchain Good For?”
Testing the World’s “Most Secure Phone” | Efani SIM
Просмотров 20 тыс.5 месяцев назад
Testing the World’s “Most Secure Phone” | Efani SIM
You Clicked a Phishing Link...NOW WHAT? (3 steps)
Просмотров 25 тыс.6 месяцев назад
You Clicked a Phishing Link...NOW WHAT? (3 steps)
The Crazy Story Behind Proton Privacy (w/ CEO Andy Yen)
Просмотров 16 тыс.6 месяцев назад
The Crazy Story Behind Proton Privacy (w/ CEO Andy Yen)
NordVPN Explains Why They Think You Should TRUST Them
Просмотров 8 тыс.6 месяцев назад
NordVPN Explains Why They Think You Should TRUST Them
Ultimate Travel Security Tips MOST People Don't Do
Просмотров 20 тыс.7 месяцев назад
Ultimate Travel Security Tips MOST People Don't Do
Are "ADVANCED" Security Programs WORTH IT??
Просмотров 15 тыс.8 месяцев назад
Are "ADVANCED" Security Programs WORTH IT??
How to Build Online Pseudonyms: Privacy 101
Просмотров 23 тыс.8 месяцев назад
How to Build Online Pseudonyms: Privacy 101
a BETTER way to protect your phone number?
Просмотров 50 тыс.9 месяцев назад
a BETTER way to protect your phone number?
Data Protection 101: What you SHOULD be doing (or not)
Просмотров 20 тыс.9 месяцев назад
Data Protection 101: What you SHOULD be doing (or not)
iOS 17: Are Security & Privacy Features Any Good?
Просмотров 18 тыс.9 месяцев назад
iOS 17: Are Security & Privacy Features Any Good?
6 hacks to secure ANY password manager you use!
Просмотров 26 тыс.10 месяцев назад
6 hacks to secure ANY password manager you use!
Should You Use Proton Pass Password Manager?
Просмотров 72 тыс.10 месяцев назад
Should You Use Proton Pass Password Manager?
If you own a domain URL...watch this NOW!
Просмотров 12 тыс.11 месяцев назад
If you own a domain URL...watch this NOW!
NEW Google Authenticator w/ Backup (should you use it?)
Просмотров 227 тыс.Год назад
NEW Google Authenticator w/ Backup (should you use it?)
Josh, you should be careful about your personal email with family and friends because they can turn on you at anytime.
and if one of those email alias gets compromised you can easily delete it and start again!
Great video. People now days react with the first thing they hear without looking at all aspects. Is mind boggling how the truth can be misconstructed these days.
People have been bagging on Proton for awhile. Just waiting for some form of confirmation bias.
I heard that you should have 2 of these, and keep one safely stored away in case the other one is lost. I lnow very little about these, how do you go about getting both of them setup for use?
how to pay anonymously in the US using crypto?
Ok, be honest, all people paranoic about your DNA and basically, you can grab my DNA from a lost hair, or even in any medical exam that I had spitted out, this test should be free considering that it is so easy to grab the DNA from someone. If we continue feeding paranoia we will finish like the Saul Goodman brother, cover us with an aluminum cape.
I love your shirt 😂
No privacy in the web
I’ve used eWallet for years. Never any complaints
Great tutorial here! But seriously, DoYouMail needs to be on your radar. Unlimited domains and email IDs for just $40/month? Beats G-Suite and Microsoft, hands down.
Thanks for the great video! By the way, DoYouMail has totally transformed my cold email game. Unlimited IDs and domains for $40/month. High deliverability like Google and Microsoft!
Awesome stuff on email security! If scaling cold emails is your goal, DoYouMail is a must. Crazy good setup, blacklisted IPs a thing of the past, and dirt cheap compared to others.
Yo, massive respect for this tutorial! Pro tip: DoYouMail is unbeatable for cold emails. Setup is a breeze and the deliverability rocks, right up there with the big guns.
It may be a stupid question, but please help. In my country protonmail is blocked and considered a "terrorist organization" I cannot easily create an account there, futhermore, even if I did, this email domain would get me flagged, so it is not safe to use Proton mail as is. Is there a way of "self hosting" email without actually physically self hosting it? Preferebly without any money trace or renting a cloud server in general
Which mobile keyboard you prefer?
The native one.
@@AllThingsSecured Google?
Could you compare DeleteMe with Optery? DeleteMe claims they’ve cleaned up everything, but an Optery scan found 45 other locations that DeleteMe missed 😳
Minor point of clarification NFC: Near field "communication" it refers to the protocol used - not the object.
Simple. Just make your proton account through the tor network on an unrelated device than your main at a local crowded hot spot.
i forgot to disconnect my VPN and when i wake up my phone suddenly closed for 15 minutes like someone trying to hack it. so i recommended you guys to use protection on your phone.
I’ll take Birwarden over 1Password any day of the week.
❤️
James bond devices? What a few usb drives and a cold storage. I think now...misleading n clickbait
It wouldn't be that hard to see for yourself. Rent a small office and get two burners. Have them text each other crazy random incriminating things via an ai script. Also have an Alexa, Google hub, etc there. Have random conversations via AI script. Then just sit and wait.
Federal investigators say they accessed encrypted Signal messages sent before the Jan. 6, 2021, riot on the U.S. Capitol and used them as evidence to charge the leader of a far-right militia group and other defendants, CNBC reports. A complaint filed by the Department of Justice refers to Signal messages without explaining how they were accessed.
How can you run a privacy and security channel and recommend iMessage? I am being sincere when I ask this question.
Is Face ID even safe?
It's available in the UK now on android smartphones, thanks for this video 🙂.
Why is Yubikey the best? Isn't it proprietary? Would an open source product be preferable? Why should we rely on Yubikey?
How can you be privacy focused and have ever used Chrome?
Thank you sa video tutorial lods
using LOC as a measurement of safety is incredibly stupid, do better guys
i hate click baits. i hate more yet people arent clear doing this .
“certain information can not be hidden” This is false. All client data stored by a company can be encrypted and only the owner can decrypt it. I point you to Apple backups; encrypted, broken up, mixed with other client backups. Apple will tell you and governments that they can not decrypt them, and they cant. But restore your phone from a backup and it works; because you hold the key. So your statement is false.
#1) FIREFOX (non-chrome based browser) #2) write the passwords down (an phone APP is safe?) #3) NEVER 2FA (they want your phone #) #4) PROTON email has been compromised #5) trash phone number on an APP using your regular phone, NO ---- all 5 are a BIG NO--- I award you no points and my god have mercy on your soul
i don't use proton because it is secure or whatever bs people say, EMAIL ISN'T SECURE BY DESING, i use proton because IT DOESN'T ASK 300 AUTHENTICATION FACTORS FOR LOGGING IN, EVEN IF I DISABLED IT
desing lol
I'm very grateful for this video
This is breathing I believe that they know where that flight from Malaysia is that because there's no way with all that that they don't know where one of those cell phones is and since they won't tell it it must be very bad where that plane is
The main problem that's just starting at the moment is govts being truly tyrannical. Currently most of the CANZUK & CUNA govts are rolling out laws to require all services that have encryption to have a "master key" or to scrape the E2E keys so that govts can easily monitor everyone. Also, and more disturbingly, the Australian govt (sorry... regime) are now trying to declare that their laws apply globally and that if an Australian citizen can access a website/service/business in any manner, then it must comply with Australian laws. This means that they don't care that social media companies are only required to comply with the laws where they're run from and hosted, Australia now requires / demands / expects / will force full compliance with Australian law. If this BS isn't stopped, then basically CANZUK & CUNA will rule the world by force and only their tyrannical laws will matter. We're truly living in a sick, twisted and demented dystopia.
01:41 Best called "usb condom"
Very helpful
I will say signals current ceo is an attrocious mega leftoid.
This is just good old contrarian brainrot. A VPN is at this point an essential security tool whether you like it or not, and the video doesn't provide a single convincing counterargument to that in my opinion. Besides the video contains many mistakes and inaccuracies : you talk about no log policies being unenforceable without even talking about independent audits once somehow, there's no mention of the legislative differences between services based within or outside the 14 eyes alliance, etc, etc.. This could have been an interesting topic where you tell people to manage their expectations, and explain that security doesn't all come down to hiding your IP, but to pretend a VPN is “unnecessary” in most use cases is simply wrong (except if you don't care about your privacy at all I guess). This is basically reversed misinformation, do better.
law is law and they must comply full privacy is impossible, i recommend you if you want to send private messages, to encrypt it with the public pgp key of the receiver
@AllThingsSecured so using that company would likely be doing more harm than good, yes? Please let me know. I’m asking again because I just signed up with Surfshark One+ 10 days ago and I have 20 more days to change/refund my VPN plan.
meta info is still out there !
Best security related advice on RUclips, period. Nothing is black and white, you should build threat models based on what your concerns are and be aware of what you are sharing and who potentially can see it. All this commotion about "proton bad" "telegram bad" "mullvad bad" only has meaning if you understand the weaknesses of each tool and how they apply to your situation. Thank you and have a sub
I AES-256 encrypt random characters, send it between Proton accounts, responding furiously... KEY POINTS: 1) Always use a VPN 2) Always user a maximum-security password 3) Always...
I like your channel and all of this information, but it is soooooooooo frustrating that all of these things are US based only. Is there anyway you can make information on all of these things like vitrual credit cards, fake phone numbers, fake emails that are based in Australia or outside of the US?
Yeah, what you said is kinda common sense. Proton never claimed anonymity. I use a "burner" recovery email address and I never EVER use a credit card. I load my Proton account credits with Bitcoin for many years ahead. They have to comply with the law, and they will give away your credit card, and all your anonymity goes down the drain. As for Signal, it's all competitor FUD, I reckon. But the logic is the same here. Don't use an identified phone number. Hide your phone number. Don't use real names etc. My only beef with Proton, although they have to comply with the law, they could've facilitated the spread of knowledge better on how to protect it. They could also widen crypto adoption and usage within Proton in terms of payments and sign-in At the end, we chose the lesser evil