YourPrivacyTV

channel image

YourPrivacyTV

RightToPrivacyTV

subscribers

Want Secure Encrypted Email? Presenting The Best Options For Encrypted Email -- How You Can Best Protect Your Security / Communication Online. Without Secure Encryption, We Would Not Have Hard Hitting Investigative Journalism. Activists Would Not Be Able To Encourage Positive Change In The World. The World Would Be Much Different, And The Powerful, Less Accountable.

Many Channels Share Top Encrypted Email Provider Lists, And So, I Felt I Too, Should Create Such A Video! Watch To Reveal The Truth!

With so many options out there for encrypted email... Where to begin? We know the big names, and the history of Lavabit, and how their secure email service led to trouble. I've also heard they brought the service back (have not checked).

Then there are options like OpenPGP / GPG... encrypting yourself for later transport, encrypted messengers... the choice for communication is yours. We talk about the safest way for Journalists / activists to communicate in order to bring about positive change in the world through transparency. This is what I stand for.

For I believe there is no transparency without the ability to achieve security and privacy - even anonymity, when desired. All of the stories brought to us by investigative journalists, would not be possible without secure encryption.

A world without encryption, is a world blind to reality.

I bring you the most honest security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow! Thanks for sharing this and all videos.

*SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW*
(honesty is the best policy!)

*SHARE YOUR THEORY / THOUGHTS IN COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely origina..

This channel has offered refurbished coreboot laptops with intel neutered & other custom options for a while - today intro new option - "heads": more advanced option for users with higher risk profiles; Most may prefer shop's standard coreboot option built for user friendliness / ease of use / maintenance .A way to support a small channel & get something awesome in return. After small following / thousands of hours video editing, wanted to offer unique way to support this channel and get something unique / secure for your donation! Making this kind of niche, smaller channel more sustainable.

*Shop (for normal coreboot + intel neutered laptop):* https://bmc.link/politictech/extras
*Commissions:* https://bmc.link/politictech/commissions (enhancement option to heads machine after booking, ram upgrade)

PUBLIC BLOG: https://bmc.link/politictech/posts

I create independent content to keep you informed, share unique tips (including completely original ideas, shared here before anywhere on the internet), and cover stories, keeping you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): rightt..

Paul Le Roux: Pioneer Of Online Telemedicine, Fit For 007 Bond Movies; Fighting Against Illegal Government Surveillance, He Created "E4M" Encryption For The Masses - Today Known As Veracrypt; Pioneer Of Online Pharmacies Or Super Villain / Creator Of Bitcoin? Watch To Find Out

From an early age Paul Le Roux had interest in computers and took programming courses. Later he went on to develop E4M, "encryption for the masses" as a way to fight back against illegal surveillance;

Giving away his software (E4M) for free, he sought developer jobs on usenet, eventually creating one of the largest online pharamacies... leading up to murder in a dark world of ex special forces mercenaries

SHARE IN THE COMMENTS

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttopr..

Maltego: Installing Excellent OSINT Tool & Finding Information Missed In Search Engines; Investigate Networks, People, Find Documents, Connections: All For 100% FREE, In Today's Tutorial; Starting Out With How To Install Maltego Community Edition

Maltego Community Edition Suite offers countless free transforms: we install each of them today, and begin with an example investigation using a fake name

Some say tools like this shouldn't be legal: -- I say Maltego is a useful tool to examine "the other side of privacy": OSINT.

Use it on yourself to see what others may be finding on you, & much more

In September We Covered How To Approach Receiving Malicious Emails / Files Safely. To Open (potentially) Malicious Emails Safely, We Used Whonix Disposable Virtual Machines;

How An Adversary / Redteam Might Hypothetically Gather Our Information / Addresses For Attack

Gathering Emails Can Also Serve Useful / Positive Purposes Such As Reaching Out To A Company Where Contact Information Is Not Easy To Find, etc.

TOPIC: OSINT

OSINT: to use publicly available information / metadata / media to gleam valuable information for research, or collection of other purpose

SHARE IN THE COMMENTS

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZ..

Get Banking Apps To WORK On GrapheneOS Secure Degoogled Android; One Common Issue Preventing Users From Trying One Of The Many Worthwhile Degoogled Android Operating System (/e/, LineageOS, CalyxOS, CopperheadOS), Is Banking Apps Not Working; Today We Cover How To Get Your Bank App Working

That said, not all banking apps may work. I would love to produce a list for everyone on the public blog. If this DOES work for you, comment below. If this DOESN'T work for you: let everyone know in the comments (or email me, address below). Let's put together a list for everyone!

There are many degoogled android rooms worth trying out. Alternatives to graphene include Calyx, Lineage. all are worth exploring and enhance phone security / privacy over store bought closed proprietary stock.

#graphene #android #banking

PUBLIC BLOG: https://bmc.link/politictech/posts
SUPPORT: https://bmc.link/politictech
MEMBERSHIP: https://bmc.link/politictech/membership
COREBOOT LAPTOP (refurbished + Intel ME neutered): https://bmc.link/politictech/extras

*SHARE IN THE COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (many, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, more viewers leads to more time to new content)

💎 **CONSIDER SUPPORTING CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

BTC: bc1q5d4ylu0d0946pe5vnjd0y4653aqh6mda..

Time Is Running Out: European Union's (Digital ID) eIDAS Wants Browsers To Require Gov Approved root Certificates, Under Premise Of Increasing Security -- Where It In Fact Adds Yet Another Party, Gaining Ability To MiTM Break HTTPS / TLS Encryption -- Revealing Passwords, Browsing, All In Plaintext

Anytime you visit an https encrypted website, you are depending on the installed root cert trust to verify the encryption is in fact secure. When there is an issue with a certificate, from expired, to potentially malicious, your browser will try to warn you -- UNLESS you have malicious root cert installed prior to visiting.

This also relates to a study facebook performed, requiring young people to install their root cert to observe browsing / history of users

eIDAS Is The EU Digital ID Reform. Today We Focus On The HTTPS Cert Aspect As Time Is Running Out To Push Back Against This Reform

We've seen similar actions by the Russian & Chinese governments... And the history for breaking https / TLS is there...

*As my previous content covers:*

Previously Covered Trustcor, And The Controveries Surrounding Their Defense / Law Enforcement Contracts For Breaking HTTPS By Installing root Certificate Trust In Browsers. It Takes Funding & Some Level Of Trust To Become A root certificate Authority... Watch that video here: https://youtu.be/TcYQCzhdEuc

One solution mentioned in today's video is taking advantage of end-to-end encryption. Even with end-to-end encryption, you should be mindful before accepting new keys, and always check the fingerprint.

A more simple solution is utilizing Tor / I2P / lokinet hidden services - which bake end-to-end encryption directly in the hidden service protocol, bypassing the need for browser validation of encryption, and handling such directly "end to end", from Tor / I2p router client, to the destination Tor / I2P client.

*SHARE IN THE COMMENTS*

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota...

Ever Taken Your Phone / Computer / Laptop To A Shop? Wonder If They Are Looking Through Your Files? We Cover This Breaking News Sting Operation Where Monitoring Software Caught Computer Technicians Red Handed Snooping On The Most Intimate Of Files - NOT all technicians snoop.

I WANT TO KNOW WHAT YOU THINK: do you take any measures before turning over devices to computer technicians? Have you tried zulu-crypt / veracrypt or similar?

Would you like a tutorial on creating safe volumes?

SHARE IN THE COMMENTS

AND:

Was This What Happened To Hunter Biden? Or Could It Have Been A Much Larger Political Operation From The Start?

I always felt some videos / photos reportedly found on his computer did not appear to be recorded "naturally". As if he were using / looking at something on his phone while being recorded -- reminds one of Pegasus backdoor.

Even moments of private conversation, appeared to be at the level a laptop camera may have been sitting at.

I share some theories on the Hunter Biden laptop escapade, and cover the sting operation catching large names like Best Buy (and others), going through devices targeting folders like "bikini" and others.

Other times technicians may copy your device - - meaning even if you get that device back, they may still have a copy of all of your files.

I share ideas and lessons learned from malware found on brand new computers, and how you can protect your most sensitive financial documents / files from computer technicians who may be of unsavory nature.

SHARE your thoughts in the comments below!

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security ..

Greatest Threat To Journalism / Democratic Values / Freespeech: An Invisible AI Scanning System That Says: "I'm Always Watching You"; In Comes Chatcontrol, One Of Many Bills Being Lobbied For With The Result Of Destroying The Confidentiality Of End To End Encryption.

We Use Encryption All The Time, And Rarely Do We Acknowledge Our Reliance On It. What Kind Of World Will It Be Where Mega Corporations Control AI, Leaving Us With A Lesser Quality, Filtered Internet?

Chatcontrol, KOSA, EARN IT ACT, UK's Online Safety Act: All Major Threats To Human Rights, Civil Liberties, Free Speech, And Journalism.

THE POSITIVE SIDE: XMPP and associated plugin protocols should not be affected by legislation targeting major platforms... At least... so far.

We are treading dangerously close to George Orwell's 1984, modernized.

☕ 📬 In Case You Missed It:check out the public I2Pmail Thunderbird set up with PGP: https://bmc.link/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-later

SHARE your thoughts in the comments below!

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/..

Adding Continually Changing I2P Eepsite Frontends; OSINT: Open Source Intelligence Is A Field Of Information Gathering Using Publicly Available Information. In An Age Where Insurance Companies And Banks Are Using Private Internet Data To Raise Rates, Stay Ahead Of The Curve And Learn Essential Techniques / Settings To Optimize Your OSINT Research Privacy / Anonymity. Don't Compromise Your Privacy / Security – Watch This Video Now!

Where we use Firefox based Librewolf in our example, you may also follow this extension on a Chrome based set up.

Browser extensions are something we need to balance the risk vs reward of. Certain extensions may affect your privacy online by changing the behavior of a browser, connections, and otherwise.

It's important to be mindful if you fully trust the developers anytime you try a new browser extension. For example, if automatic updates are enabled, you could receive a malicious update in the case a developer is not trustworthy - for this reason, we disable "automatic updates" for this extension (and others). Talked about later in this video.

When using a new browser extension, you place the trust of your entire browser experience into that extension. We Cover Multiple Options, and talk about some dangers regarding browser extensions, from potential identification to automatic updates (turn this off, shown in video).

ANYONE using OSINT: open source intelligence, Can Benefit From Following This Set Up

☕ 📬 In Case You Missed It:check out the public I2Pmail Thunderbird set up with PGP: https://bmc.link/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-later

SHARE your thoughts in the comments below!

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely ori..

Email Safety Must Watch; Sharing The Most Important Settings You Need Inside Thunderbird For Privacy / Security; No Matter Who Your Email Provider Is, Protect Security / Privacy With Regards To Email; Stay Ahead Of The Curve And Learn Essential Techniques / Settings To Optimize Your Thunderbird Experience. Don't Compromise On Privacy or Security – Watch This Video Now!

We Cover Multiple Options / Layers For Avoiding Direct Connections, Mitigations Against Remote Content Loading, How To Properly Set Up For ANY Email, Including (but not limited to): I2Pmail / Susimail / Onionmail / Gmail

ANYTHING that uses Email / Thunderbird / K9 Mail On Android, Can Benefit From Following This Set Up

☕ 📬 In Case You Missed It:check out the public I2Pmail Thunderbird set up with PGP: https://bmc.link/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-later

In this informative video, we dive deep into the world of Thunderbird email safety, bringing you invaluable insights on how to enhance your cybersecurity, protect your privacy, and ensure top-notch security in your email communications. Join us as we explore the must-know tips and tricks for using Thunderbird to its full potential and safeguarding your valuable information. Whether you're an individual concerned about online threats or a professional seeking to fortify email security, this video is tailored just for you.

SHARE your thoughts in the comments below!

Join me today in this. Leave a comment, share a thought.

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **CONSIDER SUPPORTING THIS CHANNEL** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

#Thunderbird #linux #email

NGO's Lobby Governments For Legislation Which Threaten Encryption Via AI Client-side Scanning; Recent Example Laws / Bills: Chatcontrol, UK's Online Safety Bill, USA EARN IT ACT, KOSA (Kids Online Safety Act), And More (sadly); This NGO Partners With Profitable Client-side Software Solutions Such As "Safer", In The Space; Today We Do A Dive Into This Lobbying, The Risks Of This Legislation / Tech, To Our Right To Privacy: The Most Basic Of Human Dignity.

SHARE your thoughts in the comments below!

Thorn Began As "DNA", Co-founded By Demi Moore & Ashton Kutcher. Ashton Kutcher Has Been Lobbying Governments Worldwide To Implement Experimental Technology Using AI (artificial intelligence) Cryptographic Hash Scanning; Using Cryptography

Some Of Video Includes Personal Opinion, Thought, Hypothetic Dangers, To Help Create a Balanced View In Light Of Heavy Lobbying / Advertising Only Covering The Positive Sides

Join me today in this. Leave a comment, share a thought. Maybe Thorn is the right solution? I'd love to hear your input below in the comments!

As always, if you feel I get anything wrong, please tell me, and I will correct any issues - information directly reported from public sources

EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]mail.i2p

*SOURCES:*

Whitney Webb (Journalist shown in clips): https://unlimitedhangout.com/author/whitney-webb/

BalkinInsights (investigation article covered): https://balkaninsight.com/2023/09/25/who-benefits-inside-the-eus-fight-over-scanning-for-child-sex-content/

EFF (article screenshot): https://eff.org

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **SUPPORT THIS CHANNEL** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance, qubes, whonix, Tails OS, how to get hardware working on Qubes, linux, configuration

Pegasus "zeroclick" iPhone vulnerabilities: BLASTPASS, major concern, and how to protect yourself. Stay updated on the latest news surrounding this vulnerability and implications. Discover how the UK Online Safety Bill PASSED, aiming to repeal your rights in "name of protecting others". Watch now to ensure you stay informed and safeguard your iPhone.

There have been other "zeroclick" iMessage vulnerabilities in the past, one of which was FORCEDENTRY: https://bmc.link/politictech/iphone-blastpass-zeroclick-pegasus-exploit-uk-online-safety-bill-passed

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance, qubes, whonix, Tails OS, how to get hardware working on Qubes, linux, configuration, tutorials, news, programming, ethical pentesting, human rights, privacy, cybersecurity research, radio, baofeng, and all other forms of nerdism...

THANK YOU FOR SUBSCRIBING (do it now)
#iphone #pegasus #blastpass

Among The Most Common Successful Attack Methods Are Spear Fishing Emails, & Will Likely Come For You Too (at some point). Are You Sure Emails Are Safe? Watch To Find Out How To Open (Potentially) Malicious Files / Emails Without Destroying Your Computer

Qubes provides a highly isolated environment via a foundation of various "Qubes", or virtual machines (VM). Disposable Virtual Machines allow you to risk single disposable VM, without the entire operating system being at risk. After you are finished with a given application inside a disposable virtual machine, that VM self destructs, and no malicious actions are saved.

On another level, malicious links may normally reveal your IP address, and cause you to connect out in a malicious way. To mitigate ip leaks, we can take advantage of Whonix disposable VM.

*QUBES:* qubes-os.org
*QUBES DOCUMENTAION:* https://www.qubes-os.org/doc
*QUBES DOWNLOAD:* https://www.qubes-os.org/downloads

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.

If you learn something, please consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)

💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance, qubes, whonix, Tails OS, how to get hardware working on Qubes, linux, configuration, tutorials, news, programming, ethical pentesting, human rights, privacy, cybersecurity research, radio, baofeng, and all other forms of nerdism...

THANK YOU FOR SUBSCRIBING (do it now)
#Qubes #Whonix #Linux

Making Hardware Function On Qubes System-wide - Mirror this For Other Types Of Hardware. We Use x220 Touchscreen For Our Example; (Qubes Isolates Hardware Out Of The Box For Security). If You Want A Piece Of USB Hardware To Work Across Virtual Machines, Create A Config File Similar To Shown (Will Upload Config File Soon). There Is Always Risk When Adding USB Hardware Passthrough - Once You Allow It, That Piece Of Hardware Has Control Over The System / Virtual Machine/s.

Shared early with followers of the blog (see below) - videos go public on channel after thumbnail creation (early viewing on blog)

*QUBES:* qubes-os.org
*QUBES DOCUMENTAION:* https://www.qubes-os.org/doc
*QUBES DOWNLOAD:* https://www.qubes-os.org/downloads

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, Share With Others*

Creating independent content to share unique tips (some, completely original ideas, not found elsewhere), covering stories to keep you informed on the most pressing personal security / cybersecurity / infosec / privacy / open source topics

💎 **SUPPORT INDEPENDENT CONTENT**

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive content / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

COREBOOT LAPTOP (intelME neuter & refurbish - very limited avail): https://bmc.link/politictech/commissions (limited USA service)

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance

#Qubes #Whonix #Linux

Qubes: Possibly The Most Well Known Security Focused Operating Systems. Built Upon Foundation Of Multiple Compartmentalized Virtual Machines / Xen Hypervisor, Hardware Isolation Is Everyday Life On Qubes. We Install Qubes + Whonix, Today, On RTP Tech Tips

*QUBES:* qubes-os.org
*QUBES DOCUMENTAION:* https://www.qubes-os.org/doc
*QUBES DOWNLOAD:* https://www.qubes-os.org/downloads

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics

💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive content / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

COREBOOT LAPTOP (intelME neuter & refurbish - very limited avail): https://bmc.link/politictech/commissions (limited USA service)

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance

#Qubes #Whonix #Linux

Setup An I2P Browser By Hand? Did You Block Browser DNS Requests? Let's See What Happens On Pihole When Default DNS Settings Are Left In Firefox / Browsers... Settings You May Be Missing In Your I2P Browser Config

The I2P-Desktop custom i2p profile has DNS blocked by default - so no need to change anything: http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/I2P-desktop (use tor browser to download)

In this video, I TEMPORARILY UNBLOCKED DNS queries in browser, all to demonstrate .i2p domains leaking to DNS query (for those who are setting up profile by hand).

If using I2P-desktop, you have nothing to worry about: DNS has been blocked since the beginning!

Lesson: Be careful if setting up profiles by hand.

Same goes for Tor: use Tor browser not only to blend in with other users, but for the safety features maintained by a team of developers.

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!* (once public)I create independent content to keep you informed, share unique tech tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed, on the most pressing personal security / privacy / open source topics

💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTechMEMBERSHIP:

https://bmc.link/politictech/membership (early / exclusive content / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech

💻 COREBOOT LAPTOP (intelME neuter & refurbish - very limited avail): https://bmc.link/politictech/commissions (limited USA service)

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

#I2P #Tor #anonymous

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance

#I2P #DNS #Linux

United Nations Cybercrime Treaty Has Been A Hope Of Russia's, And It's Coming Together -- What It Means For #privacy #Surveillance & Lack Of Oversight & KOSA: Bill Policing Speech? & WiPri New Flags On Gitea Onion

*AI (artificial intelligence) Could Bring Many Potential Benefits To The Humans, But With BIAS / Inaccurate Information / lack of transparency (open source = transparency), It Presents Great Danger*

Is the solution to enforce identification on the internet?

We talk about these concerns & more in today's video.

(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)

*Watch, And Share With Others!* (once public)I create independent content to keep you informed, share unique tech tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics

💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive content / more)

SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻

COREBOOT LAPTOP (intelME neuter & refurbish - very limited avail): https://bmc.link/politictech/commissions (limited USA service)

**PUBLIC BLOG:** https://bmc.link/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

We talk about mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance

#cybercrime #KOSA #privacy

TORRENT ANONYMOUSLY: Torrent is a peer-to-peer protocol (p2p), meaning if NOT using something like I2P, your IP address is shared with others / strangers. This Tutorial Demonstrates How To Protect Yourself From (potential) Malicious Actors. How To Torrent Anonymously Using I2P Network; Did You Know I2P Router Has A Torrent Client Built In? Now You Do! Let's Try It!

Many Linux operating systems offer 'torrents' as a main download option. Numerous benefits to this, including bandwidth sharing. Another reason to join the network: become part of the solution!

*DISCLAIMER:* tutorial geared towards only downloading files that are open source and you have permission to download. I stand for the basic human right / dignity that is privacy - without it, we lose our collective power in the future.

*EXAMPLE PRESTIUM SEARCH USING I2P BROWSER SET UP:* http://tracker2.postman.i2p/?view=Main&search=prestium&category=-1&orderby=-1&lastactive=0&lang=-1 (LINK REQUIRES A WORKING I2P BROWSER SET UP - SEE BLOG FOR TUTORIALS ON THIS)

(VIDEO SHARED EARLY WITH SUPPORTERS AS A "THANK YOU": NOW PUBLIC)

*Watch, And Share With Others!* (once public)I create independent content to keep you informed, share unique tech tips (some, completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics

💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://buymeacoffee.com/politictech/membership

SUPPORT OPTIONS (LIST): https://buymeacoffee.com/politictech💻

COREBOOT LAPTOP (intelME neuter & refurbish - very limited avail): https://buymeacoffee.com/politictech/commissions (limited USA service)

**PUBLIC BLOG:** https://buymeacoffee.com/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance

#torrent #anonymous #i2p

ABOUT CHANNEL: The ultimate question: is mass surveillance effective? Is mass surveillance worth the ultimate costs to civil liberties, democracy, human rights?

Platform Restrictions & Scenario: How Restrictions (For ANY Platform) Not Only Break Anonymous Frontend Searching; Restrictions Harm Transparency & May Threaten Your Ability To Detect Deamplification (shadowbanning), And, Introducing The Possibility For Undetected "Heavenbanning" (hypothetical scenario)

*WATCH AND SHARE!*

This video introduces current News & covers hypothetical scenarios - not directed at any platform. Applies to all where criteria meet.

*Watch, And Share With Others!*

I create independent content to keep you informed, share unique tech tips (some completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics

💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://buymeacoffee.com/politictech/membership

SUPPORT OPTIONS (LIST): https://buymeacoffee.com/politictech

💻 COREBOOT LAPTOP (intelME neuter & refurbish): https://buymeacoffee.com/politictech/commissions (limited USA service: ask about other options)

**PUBLIC BLOG:** https://buymeacoffee.com/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance

ABOUT CHANNEL (not this video): The ultimate question: is mass surveillance effective? Is mass surveillance worth the costs to civil liberties, democracy, human rights?

#twitter #shadowbanned #Reddit

Microsoft Presentation Revealed Future Of Windows As Cloud Based Operating System. Today We Explore This Story, And Security, Privacy, Uptime, And Possibility For This Becoming A Subscription Based Cloud Operating System - If The Cloud Goes Down, What Happens Then? - FYI: AT THE MOMENT BITCHUTE WON'T LET MY ACCOUNT COMMENT / REPLY :'(

*WATCH AND SHARE!*

A Cloud Based Application / Operating System Is Where Your Operating System Runs On Remote Servers, AI Integration; Today Covering This News Story, Along With Analysis, Concerns: What It Could Mean For Data Privacy, Security, And Uptime.

I create content to keep you informed, share unique tech tips (some completely original ideas, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics

💎 **SUPPORT INDEPENDENT CONTENT** (Thank You)

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

MEMBERSHIP: https://buymeacoffee.com/politictech/membership

SUPPORT OPTIONS (LIST): https://buymeacoffee.com/politictech

💻 COREBOOT LAPTOP (intelME neuter & refurbish): https://buymeacoffee.com/politictech/commissions (limited USA service: ask about other options)

**PUBLIC BLOG:** https://buymeacoffee.com/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance

ABOUT CHANNEL (not this video): The ultimate question: is mass surveillance effective? Is mass surveillance worth the costs to civil liberties, democracy, human rights?

#Windows #cloud #private

France Parliament Passes Ability To Secretly Turn On Smart Device / IoT / Smartphone Microphones / Cameras To Listen To Users & Checking out Ramble: Privacy Focused (clearnet / I2P / Tor / Yggdrasil) Forums Similar To Reddit

LINKS TO RAMBLE:

https://ramble.pw (clearnet internet - normal browser)

http://ramble.i2p/ Ramble (I2P)

http://rambleeeqrhty6s5jgefdfdtc6tfgg4jj6svr4jpgk4wjtg3qshwbaad.onion/ Ramble (Tor)

http://%5B200:b846:2eaa:4ed5:260c:a883:4df4:f79f%5D/ Ramble (Yggdrasil)

💎 **SUPPORT INDEPENDENT CONTENT**

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

💻 COREBOOT LAPTOP (intelME neuter & refurbish): https://buymeacoffee.com/politictech/commissions (limited USA service: ask about other options)

**PUBLIC BLOG:** https://buymeacoffee.com/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance

The ultimate question: is mass surveillance effective? Is mass surveillance worth the costs to civil liberties, democracy, human rights?

#IoT #private #reddit

Converting Existing Debian Install To Kicksecure With Additional Hardening; Finally, We Install Whonix In VirtualBox - Start To Finish

**STEP #1:** Install Debian With User: 'user' To Bootable Storage Device Of Your Choice: https://wiki.debian.org/DebianInstall#Creating_a_Bootable_Debian_USB_Flashdrive

**STEP #2:** Follow This Video And Documentation At: https://www.kicksecure.com/wiki/USB_Installation

TIMESTAMPS
00:00 Introduction
00:39 We Installed Debian In Preparation For This Video
01:22 Update Debian
02:29 Kicksecure Conversion Commands Begin
04:57 Adding Debian apt-tor-transport .onion Upgrades
10:55 Installing Whonix Virtualbox Set Up On Kicksecure
13:49 Connecting Whonix Gateway To Tor
14:35 SHARE VIDEO & FOLLOW FOR MORE UNIQUE CONTENT

💎 **SUPPORT CHANNEL / 100% INDEPENDENT CONTENT**

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

💻 COREBOOT THINKPAD (intelME neuter & refurbish): https://buymeacoffee.com/politictech/commissions (limited service: ask about other options)

**PUBLIC BLOG:** https://buymeacoffee.com/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p

📬 CLEARNET EMAIL: righttoprivacy[at]i2pmail.org

#kicksecure #security #whonix
mass surveillance pros and cons, mass government surveillance pros and cons, disadvantages of mass surveillance, cons of mass surveillance, benefits of mass surveillance, is mass surveillance effective?

Mass Surveillance Lobbyists Increased Political Donations 10 x Fold, In Turn, Politicians Allow Them To Write "Industry Friendly Privacy Legislation" & This Week News: FTC Fines Amazon For Allowing "Unfettered Access" To Ring / Alexa Media (Contractors / Employees)

Could (but cannot yet prove) Certain Big Tech Firms (not necessarily any mentioned here) Have Played Role In #TheRestrictAct, Among Other Highly Invasive Legislation? Some Stand To Benefit Greatly.

**PLEASE SHARE VIDEO TO INFORM / HELP CHANNEL BECOME RECOMMENDED (many hours editing for each video / post; THANK YOU for sharing this)**

**PUBLIC BLOG:** https://buymeacoffee.com/politictech/posts

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

💎 **SUPPORT CHANNEL / INDEPENDENT CONTENT**

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

💻 COREBOOT THINKPAD (intelME neutered & refurbished): https://buymeacoffee.com/politictech/commissions (limited service: can also accept xmr / other options) - can even offer Kicksecure preinstalled with Whonix set up for this support option

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (use tutorial below to set yours up)

📬 CLEARNET EMAIL: righttoprivacy[at]i2pmail.org

📧 THUNDERBIRD I2PMAIL + PGP TUTORIAL: https://www.buymeacoffee.com/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-later

LOBBYIST BLOG ARTICLE CITED IN VIDEO: https://www.buymeacoffee.com/politictech/report-amazon-lobbyists-attack-privacy-legislation

LATEST AMAZON FTC ARTICLE: https://techcrunch.com/2023/05/31/amazon-ring-ftc-settlement-lax-security/

Introducing Kicksecure: Security Focused Linux Distribution With Usability In Mind Coming From Whonix Dev (whonix is based off of Kicksecure). Based On Debian, Kicksecure Integrates Several Security Enhancements, With More Announced. With Security / Privacy In Mind
(SHARE THIS VIDEO TO HELP CHANNEL BECOME RECOMMENDED)

First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)

💎 **SUPPORT CHANNEL**

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

💻 COREBOOT THINKPAD (intelME neutered & refurbished): https://buymeacoffee.com/politictech/commissions (limited service: can also accept xmr / other options) - can even offer Kicksecure preinstalled with Whonix set up for this support option

📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p

📬 CLEARNET EMAIL: righttoprivacy[at]i2pmail.org

📧 THUNDERBIRD I2PMAIL + PGP TUTORIAL: https://www.buymeacoffee.com/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-later

**PLEASE SHARE THE VIDEO TO HELP THE CHANNEL BECOME RECOMMENDED (putting many hours into each video / post; THANK YOU for sharing this!)**

KICKSECURE WEBSITE: https://www.kicksecure.com

KICKSECURE GITHUB: https://github.com/Kicksecure

WHONIX: https://www.whonix.org

#kicksecure #linux #secure

Virtual Machines Getting Started With Gnome-Boxes, Using Prestium I2P Amnesiac Operating System (Like Tails For I2P) For Our Example - Or Try Out Any Other Linux Operating System As A Virtual Machine Inside Gnome-Boxes

A virtual machine is an emulation (emulates another computer on your computer) offering you the ability to try out different operating systems without partitioning your harddrive and can offer similar protection (in some ways) to sandboxing.

**DISCLAIMER:** Prestium is a very young operating system and has not been formally audited prior to video. For added safety, if you want to test, try inside a gnome-boxes virtual machine as demonstrated here. I have a good feeling about it so far, but, afterall, this is only a "feeling" / opinion, monitoring feedback for several months. This disclaimer will be removed in the future. Developer is friendly and can be found on reddit: https://reddit.com/r/prestium

PUBLIC BLOG: https://buymeacoffee.com/politictech/posts

MOST RECOMMENDED TUTORIALS / VIDEOS (all public): https://www.buymeacoffee.com/politictech/today-is-data-privacy-day

GITEA ONION (use Tor Browser): http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/explore/repos

I2P-Desktop (automated i2p browser shortcut, stops / starts i2p for you): http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/I2P-desktop (use Tor Browser for link)

TIMESTAMPS:
00:00 Intro
02:14 Virtual Machines & Gnome-Boxes
03:24 Install Gnome Boxes
04:58 Download Prestium I2P Amnesiac Operating System
05:10 Adding New Virtual Machine In Gnome-Boxes
05:44 Starting Up Prestium Virtual Machine
06:53 Exploring Prestium Applications
10:55 Fixing I2P Site Errors With Jump Helper
12:34 SHARE THIS VIDEO AND THANKS FOR WATCHING!

SUPPORT CHANNEL OPTIONS

MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

CASHAPP - https://cash.app/$HumanRightsTech

COREBOOT THINKPAD (intelME neutered & refurbished): https://buymeacoffee.com/politictech/commissions (limited service: can also accept xmr / other options)

CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com

CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p

CLEARNET EMAIL: righttoprivacy[at]i2pmail.org

THUNDERBIRD I2PMAIL + PGP TUTORIAL: https://www.buymeacoffee.com/politictech/thunderbird-i2pmail-pgp-post-under-construction-public-later

**RELATED LINKS**

PRESTIUM AMNESIAC I2P OPERATING SYSTEM: https://prestium.org

FIND LINUX OPERATING SYSTEMS: https://distrowatch.org

ANOTHER PRESTIUM VIDEO FOUND: https://www.youtube.com/watch?v=xHxGm6BK6j0 (using virtualbox in this one)

#virtualmachines #anonymous #private

SHOW MORE

Created 4 years, 10 months ago.

191 videos

Category Science & Technology

🛡️ "Privacy: the singular right able to protect all of your other rights". --RTP

🎉 😎 SUPPORT (Keep Channel Alive - Sharing Links Is Another Way To Support)

❤️MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM

💻 COREBOOT (Intel Management Engine Removed Max / Neutered) THINKPAD: https://buymeacoffee.com/politictech/commissions (custom rare service / device! - limited available)

🤑 💵 CASHAPP - $HumanRightsTech

👁️‍🗨️ Full Support Options (incl BTC List) At Public Blog: https://buymeacoffee.com/politictech

Dedicated to helping others protect their privacy online & covering Linux/Infosec topics in an age of predatory
Surveillance Capitalism.

➡️ Custom Tutorials (Public Blog) Organized By Category: https://bmc.link/politictech/posts
Blog Mirror (Most Posts) https://politictech.wordpress.com

If you want to support these efforts & help dedicate more time towards the channel, appreciate any and all donations, no matter how small :)

Thanks for coming by. Please Like, SHARE (genuine content is suppressed) & Subscribe