Skip to content

Latest commit

 

History

History
978 lines (491 loc) · 42.3 KB

sources.md

File metadata and controls

978 lines (491 loc) · 42.3 KB

Go Incognito Sources

(Updated October 10, 2021) Thank you for watching Go Incognito. This document lists all sources used throughout the course for students to verify claims & read through resources.

The numbering system is Section.Lesson.Source; so 1.1.1 would be section 1, lesson 1, source 1. CTRL-F through this document to find a specific source mentioned in a lesson.

Section 1

1.1.1 Techlore YouTube Channel

1.2.1 United States Right to Privacy

1.2.2 Universal Declaration Human Rights

1.2.3 Minnesota Sues U.S. Bank For Sharing Data

1.2.4 Timeline of Facebook Privacy Issues

1.2.5 Private Medical Data for Sale

1.2.6 Lifelock

1.2.7 Amy Boyer Case

1.2.8 Uncovering ECHELON

1.2.9 FinCEN

1.2.10 XKeyscore

1.2.11 NSA Tracking cellphone locations

1.2.12 Optic Nerve: Yahoo Webcams

1.2.13 PRISM what we know to date

1.2.14 Why Privacy Matters, Glenn Greenwald TED Talk

1.2.15 Evidence Mass Surveillance Works?

1.2.16 Evidence Mass Surveillance Works?

1.2.17 Evidence Mass Surveillance Works?

1.2.18 NSA Program Stopped No Terror Attacks

1.2.19 Evidence Mass Surveillance Works?

1.2.20 1984, George Orwell (Affiliate Link)

1.2.21 China Aims for Surveillance

1.2.22 United States, State Whistleblower Laws

1.2.23 Reality Winner Pleads Guilty

1.2.24 Former FBI Agent Admits Sharing Documents

1.2.25 Edward Snowden Biography

1.2.26 State of Surveillance with Edward Snowden

1.3.1 [Discontinued Source - Video Surveillance Storage Management]

1.3.2 TSA New Body Scan Policy Privacy Concerns

1.3.3 George V. TSA Privacy Case

1.3.4 How Many Antiviruses Forum

1.3.5 Do You Need an Antivirus Video

1.3.6 AVG Privacy Policy Concerns

1.4.1 Backdoor Pressure

1.4.2 FOSS Study

1.4.3 More on FOSS Video

1.4.4 AlternativeTo.net

1.5.1 About FISA

1.5.2 About FISA

1.5.3 PRISM Renewed & Info

1.5.4 Lavabit & Snowden

1.5.5 FBI Apple Backdoor

1.5.6 McAfee and His Journeys

1.5.7 McAfee Blog

1.5.8 get-metadata.com

1.5.9 Scrambled Exif

1.5.10 PhotoExif

1.5.11 ViewExif - Now Discontinued

1.5.12 TailsOS mat

Section 2

2.2.1 Java, Reader, & Flash Exploits

2.2.2 First Techlore Video (Free VPN for iOS)

2.2.3 Beats Firmware Updater

2.2.4 Removing Mac Program Remnants

2.2.5 Geek Uninstaller

2.2.6 AppCleaner

2.2.7 Spy Software mSpy Leaks

2.2.8 Spy Software Teen Apple ID Leak

2.3.1 Basics of Cookies

2.3.2 Verizon Supercookies

2.3.3 Verizon UIDH Tracking

2.3.4 Supercookies & Evercookies

2.3.5 CCleaner

2.3.6 CCleaner Malware Hack

2.3.7 BleachBit

2.3.8 BleachBit Doesn’t Like MacOS

2.3.9 SD Maid

2.3.10 David Kernell Sarah Palin Hack

2.3.11 Sarbanes Oxley Act

2.4.1 Google My Activity Page

2.4.2 Google

2.4.3 Have I Been Pwned

2.4.4 pipl - Now a Premium Service Only

2.4.5 AnyWho

2.4.6 How You End Up On People-Searching Websites

2.4.7 TempMail

2.4.8 FreePhoneNum

2.4.9 Deseat.me

2.4.10 JustDeleteMe

2.4.11 How To Delete Google From Your Life Video

2.4.12 TinEye

2.4.13 How To File DMCA Request

2.4.14 On Social Media, Privacy Is No Longer a Personal Choice (Social Media #1)

2.4.15 A Timeline of Facebook’s Privacy Issues—and its Responses (Social Media #2)

2.4.16 Twitter’s New Privacy Policy: Here’s What We Do With Your Data (Social Media #3)

2.4.17 Snapchat Settles FTC Charges with “Disappearing Messages” (Social Media #4)

2.4.18 How Heavy Use of Social Media is Linked to Mental Illness (Media Health #1)

2.4.19 All the Ways Social Media is Affecting Your Mental Health (Media Health #2)

2.4.20 Online Social Networking and Mental Health Journal (Media Health #3)

2.4.21 Is Social Media Bad For You? (Media Health #4)

2.4.22 Phone Addiction is Real—And So Are its Mental Health Risks (Media Health #5)

2.4.23 Impact of Social Media on Mental Health Study (Media Health #6)

2.4.24 Remove Your Personal Info From Data Brokers

2.4.25 Abine | Remove Personal Information

2.4.26 LifeLock & Equifax Suck.

Section 3

3.2.1 Android Toast Overlay Attack

3.2.2 BlueBorne Vulnerability

3.2.3 Key Reinstallation Attacks (KRACK)

3.3.1 Cambridge Analytica

3.3.2 Cambridge Analytica and Trump campaign

3.3.3 Uber Tracking When App Closed

3.3.4 Uber God View

3.3.5 Uber Secret Permissions

3.3.6 Tesla Legal Page

3.3.7 2017 Data Breaches

3.3.8 AppCensus

3.3.9 Windows 10 Privacy Guide

3.3.10 W10Privacy

3.4.1 John the Ripper

3.4.2 oclHashcat

3.4.3 Nude Celebrity Hack

3.4.4 Elcomsoft Phone Breaker

3.4.5 iBrute

3.4.6 Ajit Gaddam Talk @ Usenix Engima 2019

3.4.7 Michael Lynton Emails

3.4.8 Ashley Madison Data Breach

3.4.9 Passwords from Ashley Madison

3.4.10 LastPass

3.4.11 1Password

3.4.12 dashlane

3.4.13 Problems with Cloud-Based Password Managers

3.4.14 OneLogin Hack

3.4.15 LastPass Hack

3.4.16 KeePass

3.4.17 Techlore Password Management Guide Video

3.4.18 Master Password

3.4.19 Americans & Cybersecurity

3.4.20 TouchID Hack

3.4.21 FaceID Hack

3.4.22 Fingerprint Phone Vulnerability

3.4.23 Voice Biometrics are NOT Accurate

3.4.24 Dead Man Fingerprint

3.4.25 Unlock Phone Murder

3.4.26 Passcode Protection

3.4.27 Fingerprints and the 5th Amendment

3.4.28 PrivacyTools IO

3.4.29 ALP is predictable, as one can predict.

3.4.30 Stop using ALP

3.4.31 Smart Phone Stats

3.5.1 The Bee Movie

3.5.2 Captain America Civil War - No Longer Available

3.5.3 Terminator 2 - No Longer Available

3.5.4 Charlie’s Angels

3.5.5 Stop Using Texts for 2FA

3.5.6 Linus got hacked!?!?!?

3.5.7 boogie2988 Channel

3.5.8 The Art of Invisibility (Affiliate Link)

3.5.9 Are Text Messages Encrypted?

3.5.10 Authy

3.5.11 FreeOTP

3.5.12 andOTP

3.5.13 YubiKey

3.6.1 Google Sees Everything You Do

3.6.2 DuckDuckGo

3.6.3 DuckDuckGo Court US Jurisdiction - No Longer Available

3.6.4 Additional DuckDuckGo Jurisdiction Concerns

3.6.5 DuckDuckGo Partly Proprietary

3.6.6 DuckDuckGo Using Amazon Hosting

3.6.7 Startpage

3.6.8 searx.me

3.6.9 searx.me Pronunciation?

3.7.1 Apple Safari

3.7.2 Google Chrome Speed

3.7.3 Microsoft Edge

3.7.4 Google Chrome

3.7.5 Google My Activity

3.7.6 Google Chrome Local File Scanning

3.7.7 Chromium Privacy Policy

3.7.8 ungoogled-chromium

3.7.9 Mozilla Firefox

3.7.10 Firefox Telemetry

3.7.11 Firefox Addons

3.7.12 Firefox about:config Menu

3.7.13 Waterfox Browser

3.7.14 Brave Browser

3.7.15 Tor Browser

3.8.1 Privacytools.io Firefox about:config Tweaks

3.8.2 HTTPS Everywhere

3.8.3 About HTTP/S

3.8.4 uBlock Origin

3.8.5 Adblock Plus Whitelisting Ads

3.8.6 Privacy Badger

3.8.7 Privacytools.io WebRTC Details

3.8.8 Decentraleyes

3.8.9 Google Hosted Libraries

3.8.10 jQuery CDN

3.8.11 Cookie AutoDelete

3.8.12 Java, Adobe Reader, and Flash Exploits

3.8.13 Exploiting Meltdown/Spectre via JavaScript

3.8.14 The Death of Adobe Flash

3.8.15 CanvasBlocker

3.8.16 Canvas Fingerprint Defender

3.8.17 NoScript

3.8.18 ScriptBlock

3.8.19 uMatrix

3.8.20 The Hated One Firefox Hardening Guide

3.9.1 Web Browsing Behavior Study

3.9.2 Keyboard Privacy Extension for Chromium

3.9.3 Behavioral Keyboard Privacy for Firefox

3.10.1 Panopticlick - Now rebranded to 'Cover Your Tracks'

3.10.2 AmIUnique

3.10.3 BrowserSPY.dk (Discontinued)

3.10.4 NoScript

3.10.5 Panopticlick

3.10.6 User-agent- Switcher

3.10.7 Tor Project

3.11.1 ISPs Selling User Data

3.11.2 ISPs Lobbying Congress

3.11.3 ProtonVPN

3.11.4 Windscribe

3.11.5 DEFCON Chema Alonso XROXY

3.11.6 'Are Free VPNs Good or Evil?' Video

3.11.7 'VPN 14 Eyes Explained' Video

3.11.8 Privacytools.io - The Fourteen Eyes

3.11.9 Privacytools.io - VPN Recommendations

3.11.10 Techlore VPN Reviews, Tools, & Resources

3.11.11 Mullvad

3.11.12 IVPN

3.11.13 NordVPN

3.11.14 PrivateInternetAccess

3.11.15 Vanilla Visa Gift Card

3.11.16 IPVanish Caught Logging

3.11.17 HideMyAss Caught Logging

3.11.18 PureVPN Caught Logging

3.11.19 WireGuard

3.11.20 WireGuard 1.0 & Linux Kernel

3.12.1 Security vs Privacy! | Go Incognito 1.3

3.12.2 'Macs Don't Get Viruses' Myth-Busting

3.12.3 How To Uninstall McAfee Antivirus Video

3.12.4 Antivirus Privacy Concerns

3.12.5 Windows Defender Protection Test

3.12.6 Operating System Vulnerabilities

3.12.7 ClamAV

3.12.8 iOS Security Recap

3.12.9 VirusTotal

3.12.10 Your Browsing Habits | Go Incognito 3.9

3.12.11 Linux Firewalls

3.12.12 NetGuard (Play Store)

3.12.12(1) NetGuard (F-Droid)

3.12.13 GuardedID

3.13.1 Why Deleting Files Doesn't Work

3.13.2 Recuva

3.13.3 CCleaner

3.13.4 BleachBit

3.13.5 Mac Secure File Deletion

3.13.6 Eraser

3.13.7 Mac Secure File Deletion

3.13.8 Erasing Data From SSDs

3.13.9 SSD Lifespans & Write Cycles

3.14.1 7-Zip

3.14.2 VeraCrypt

3.14.3 VeraCrypt Video Guide

3.14.4 The GNU Privacy Guard

3.14.5 OpenPGP

3.14.6 Drive Encryption Video Demo

3.14.7 Control Over Encryption Keys

3.14.8 iCloud Encryption & Backups

3.14.9 Companies in PRISM

3.14.10 Cryptomator

3.14.11 MEGA

3.14.12 ProtonDrive (Unreleased)

3.14.12(1) ProtonDrive Info

3.14.13 Nextcloud

3.15.1 SMS Security Concerns

3.15.2 NSA AT&T Whistleblower

3.15.3 NSA AT&T Secret Rooms

3.15.4 Modern NSA AT&T Spy Hubs

3.15.5 Signal Messenger

3.15.6 Threema

3.15.7 Wire

3.15.8 Telegram

3.15.9 Briar

3.15.10 Wickr

3.15.11 WhatsApp Metadata

3.15.12 Telegram Security Concerns

3.15.13 ChatSecure

3.15.14 XMPP

3.15.15 Jabber

3.15.16 Kontalk

3.15.17 Matrix

3.15.18 Element

3.15.19 Privacytools.io Real Time Communication

3.15.20 WhatsApp

3.15.21 Burner

3.15.22 Shuffle (Discontinued)

3.15.23 MySudo

3.15.24 Email Is Completely Insecure by Default

3.15.25 Privacytools.io Email Resources

3.15.26 Google Reads/Scans Your Emails

3.15.27 Mailvelope

3.15.28 ProtonMail

3.15.29 Disroot

3.15.30 Tutanota

3.15.31 Countermail

3.15.32 Top 5 Email Providers Techlore Video

3.15.33 Email Metadata Information

3.15.34 TempMail

3.15.35 Guerrilamail

3.15.36 Harvard Bomb Threat Guerrilamail

3.15.37 10MinuteMail

3.15.38 I2P-Bote (Discontinued)

3.15.39 Nextcloud

3.15.40 Firefox Send (Discontinued)

3.15.41 OnionShare

Section 4

4.2.1 Windows 10 Privacy Nightmare

4.2.2 Microsoft NSA Messages

4.2.3 W10Privacy

4.2.4 Permissions & Settings | Go Incognito 3.3

4.2.5 Apple Privacy Recap

4.2.6 Apple iCloud Privacy

4.2.6(1) Apple Transparency Report

4.2.7 Apple Kickass Torrents FBI

4.2.8 NSA PRISM

4.2.9 Ubuntu Amazon Spyware

4.2.10 Ubuntu

4.2.11 Linux Mint

4.2.12 Fedora

4.2.13 Debian

4.2.14 FreeBSD

4.2.15 OpenBSD

4.2.16 BSD vs Linux Differences

4.2.17 HardenedBSD

4.2.18 AlternativeTo

4.2.19 Switched to Linux

4.2.20 Switched to Linux & Techlore Linux Livestream

4.3.1 OnePlus Phone Spying

4.3.2 GrapheneOS

4.3.3 Android Bloatware Explained

4.3.4 Motorola Phone Spying

4.3.5 HTC Sensation and EVO 3D Spying

4.3.6 Samsung Peeping Tom Phone Spying

4.3.7 XDA Developers

4.3.8 LineageOS

4.3.9 F-Droid

4.3.10 Introduction to APK Files

4.3.11 Aurora Store

4.3.12 Open GApps

4.3.13 MicroG

4.3.14 CalyxOS

4.3.15 GrapheneOS Techlore Review

4.3.16 CalyxOS Techlore Review

4.3.17 Purism Librem 5

4.3.18 Pine64 Pinephone

4.4.1 QubesOS

4.4.2 Whonix

4.4.3 TailsOS

4.4.4 Anonymity Operating System Comparison

4.4.5 Ventoy

4.5.1 Tor Real-World Uses

4.5.2 Tor Browser

4.5.3 Go Incognito 3.10 - Browser Uniqueness

4.5.4 TailsOS

4.5.5 Whonix

4.5.6 Should You Install Extensions in Tor?

4.5.7 Keystroke Traits to Track Users in Tor

4.5.8 Malicious Relays on the Tor Network

4.5.9 Tor Differential Treatment For Tor Users

4.5.10 Brave Privacy Window w/ Tor Functionality

4.5.11 Tor Use After Freedom Hosting Compromise

4.5.12 Tor & VPNs?

4.5.13 I2P

4.5.14 Freenet

4.6.1 Bitcoin Double-Spending Explained

4.6.2 Monero

4.6.3 Techlore Bitcoin ATM Video

4.6.4 LocalBitcoins

4.6.5 Bisq

4.6.6 Techlore Anonymous Cryptocurrency Video

4.7.1 Techlore Resources

4.7.2 Techlore Surveillance Report

4.7.3 Have I Been Pwned

Section 5

5.2.1 Techlore Drive Encryption Video

5.2.2 BitLocker

5.2.3 FileVault

5.2.4 iOS Encryption

5.2.5 Android Full-Disk Encryption

5.2.6 Veracrypt

5.2.7 Techlore Veracrypt Tutorial

5.2.8 Printers/Copiers Storing Data

5.2.9 Libreboot

5.2.10 Coreboot

5.2.11 Managing Health Privacy

5.2.12 Techlore Health/Fitness Tracking Options

5.2.13 Blake Robbins School Webcam Spying

5.3.1 MAC Address Garbage Cans

5.3.2 Change MAC in Windows/MacOS/Linux

5.3.3 Technitium

5.3.4 spoof MAC Address Tool

5.3.5 Change MAC in Android

5.3.6 Android MAC Randomization

5.3.7 iOS 14 MAC Address Randomization

5.4.1 WEP is Bad

5.4.2 How to Access Home Router Admin

5.4.3 Go Incognito 3.4 - Passwords

5.4.4 Is Hiding Your SSID More Secure?

5.4.5 WPS Issue 1

5.4.6 WPS Issue 2

5.4.7 Pixiewps

5.4.8 Bypassing MAC Address Filters

5.4.9 OpenWrt

5.4.10 pfSense

5.5.1 Bluetooth Attacks & Security Risks

5.5.2 BlueBorne

5.5.3 Bluetooth Wikipedia Page

5.5.4 Retail Bluetooth Shopping Beacons

5.5.5 Location Data Privacy Usage

5.5.6 Apple Location Data Issue

5.5.7 US Government Using Cell Location Data

5.5.8 GPS Data to Track Americans

5.5.9 Android Spoof Location

5.5.10 iOS Spoof Location

5.5.11 Usenix Enigma 2019 Serge Egelman

5.5.12 NFC Concerns

5.5.13 Bluetooth and NFC Beacons to Personalize Shopping

5.5.14 Retail Tracking Privacy Analysis

5.5.15 Google & Apple Map our WiFi Locations

5.5.16 CSEC Tracking Canadian Travelers

5.5.17 Pat Barbaro Australian Mafia Investigation

5.5.18 Cell Companies Selling Location Data

Section 6

6.2.1 IRS Scams

6.2.2 FTC Settlement with Toysmart.com

6.2.3 Companies Will Sell or Transfer Your Data

6.2.4 RadioShack Bankruptcy and User Data

6.3.1 Trading Data For a Cookie

6.3.2 DNA Sites Are the Wild West of Privacy

6.3.3 MyHeritage Breach

6.3.4 23andMe Pharma Deals

6.3.5 FTC Investigating DNA Firms Over Privacy

6.3.6 Facial Recognition From DNA

6.3.7 Blogger Beaten For Boasting Crypto

6.3.8 Legal Trusts Explained

6.4.1 Tempmail

6.4.2 Guerrilla Mail

6.4.3 SimpleLogin

6.4.4 Burner

6.4.5 MySudo

6.4.6 Fake Name Generator

6.5.1 All Business Breaches

6.5.2 Vanilla Visa

6.5.3 Viabuy

6.5.4 OptOutPrescreen

6.5.5 Virtual Card Numbers

6.5.6 Privacy.com

6.6.1 Offsite Backups

6.6.2 CCTV FOSS Options

6.6.3 Alexa Is Listening

6.6.4 Burglars Casing Homes

6.6.5 Facial Recogniton Eye Glasses

6.6.6 Masks Fooling Facial Recognition

6.6.7 FTC Opt Out

6.6.8 Triangle-Based Facial Detection

6.7.1 Techlore Resources

6.7.2 Tor

6.7.3 TailsOS

6.7.4 Whonix

6.7.5 EFF

6.7.6 ProtonMail

6.7.7 Searx.me

6.7.8 Startpage

6.7.9 DuckDuckGo

6.7.10 Veracrypt

6.7.11 BSD

6.7.12 QubesOS

6.7.13 GrapheneOS

6.7.14 CalyxOS

6.7.15 VirtualBox

6.7.16 KVM

6.7.17 Libreboot

6.7.18 Coreboot

6.7.19 OpenWrt

6.7.20 pfSense

6.7.21 Monero

6.7.22 Purism

6.7.23 Pine64

6.7.24 system76

6.7.25 RetroFreedom

6.7.26 Ledger Nano

6.7.27 iPad

6.7.28 Chromebook

6.7.29 Techlore Top 10 Privacy Tools Video