1
00:00:00,240 --> 00:00:06,799
so loads of people enjoy their alone time but you don't necessarily want

2
00:00:04,720 --> 00:00:11,679
people knowing about what you watch while wasting kleenex polishing your

3
00:00:09,360 --> 00:00:14,719
trophy so what can you do if you're streaming online you can always use

4
00:00:13,200 --> 00:00:19,199
private browsing but there's ways to attract your activities in spite of that

5
00:00:17,520 --> 00:00:23,119
and if your preferred medium is locally stored on your computer there are many

6
00:00:20,960 --> 00:00:27,119
dangers there as well so in this video we'll show you ways to keep your sausage

7
00:00:24,880 --> 00:00:30,960
flicking material private whether you stream your content or watch it locally

8
00:00:29,519 --> 00:00:36,079
give the video a like if you want to see us test how modern hardware plays old

9
00:00:33,600 --> 00:00:45,520
hardcore games like crisis one and witcher one

10
00:00:45,520 --> 00:00:51,200
so i'm sure a horde of chicken chokers are going to comment about how they will

11
00:00:49,840 --> 00:00:55,440
run their browser in private mode whenever they want to watch content

12
00:00:53,039 --> 00:00:59,520
while peeling their bananas and they're right to a certain degree in today's day

13
00:00:57,600 --> 00:01:04,080
and age streaming your content or holding physical pictures documents or

14
00:01:01,600 --> 00:01:07,280
even video in say a cloud storage account is often the best way to go if

15
00:01:06,000 --> 00:01:12,159
you're trying to hide it from friends and family because it largely keeps the

16
00:01:09,680 --> 00:01:16,640
data off your computer but it isn't perfect there are a number of ways to

17
00:01:14,479 --> 00:01:20,479
track this however like key loggers stealthy background applications that

18
00:01:18,240 --> 00:01:24,799
can record your typing and transmit it externally to someone else and packet

19
00:01:22,880 --> 00:01:28,400
sniffers like wireshark that analyze your network traffic now to be fair

20
00:01:26,880 --> 00:01:32,000
these things could only really be in place if someone with a fair amount of

21
00:01:30,000 --> 00:01:35,680
technical prowess had access to your computer or your network but it's

22
00:01:34,000 --> 00:01:39,600
something to consider nonetheless comparing a packet sniffer is rather

23
00:01:37,439 --> 00:01:43,439
simple you can just run a vpn encrypting your traffic but if someone has direct

24
00:01:41,680 --> 00:01:48,000
access to your computer for almost any period of time they can easily install

25
00:01:45,520 --> 00:01:52,560
something like a key logger or in the event that your carelessness left your

26
00:01:50,000 --> 00:01:55,360
incognito browser window open simply look at your screen and see what you'd

27
00:01:54,240 --> 00:01:59,439
been up to so how do you avoid all that without

28
00:01:57,280 --> 00:02:03,439
being obvious and paranoid about people touching your computer here's a cool

29
00:02:01,119 --> 00:02:08,479
idea use a separate device for that a laptop tablet phone or even desktop can

30
00:02:06,000 --> 00:02:12,480
all be used and if you follow our three tenets when it comes to said device you

31
00:02:10,560 --> 00:02:17,280
shouldn't have any problems it should be one fast to access two anonymous by

32
00:02:15,760 --> 00:02:22,319
logging in with throwaway accounts and using a vpn and three private through

33
00:02:20,080 --> 00:02:26,480
physically hiding it by the way we don't really recommend under the mattress it's

34
00:02:24,720 --> 00:02:31,920
kind of obvious it's from these principles that we derive our names for

35
00:02:28,080 --> 00:02:33,280
these devices fap tops phablets fapones

36
00:02:31,920 --> 00:02:37,599
and fappooters now onto local storage protection stage

37
00:02:35,599 --> 00:02:42,239
one of this is to just hide it put it somewhere people don't commonly go like

38
00:02:39,680 --> 00:02:45,519
system folders or app data another simple way to do this is to just

39
00:02:43,840 --> 00:02:49,360
technically hide it go into folder properties and click the hidden check

40
00:02:47,200 --> 00:02:53,200
box but as many of you know this is still very easy to find so another minor

41
00:02:51,440 --> 00:02:57,360
step that you can make is to make it invisible by going into properties

42
00:02:55,120 --> 00:03:02,879
making its folder icon blank then renaming it to blank by holding alt and

43
00:02:59,599 --> 00:03:05,360
then typing zero one six zero what this

44
00:03:02,879 --> 00:03:09,920
does it is it removes the name and the icon for the folder or file the problem

45
00:03:07,840 --> 00:03:14,720
with that is that it leaves a blank spot which may actually stand out more than a

46
00:03:12,319 --> 00:03:18,159
clever name and realistically people can still find these pretty easily if

47
00:03:16,560 --> 00:03:22,800
they're looking for them you can go through the process of changing the extensions and names for all your files

48
00:03:21,120 --> 00:03:27,680
through a batch process but that's frustrating doesn't completely protect

49
00:03:24,959 --> 00:03:32,239
them anyways and it's time consuming which is a violation of our fast to

50
00:03:30,000 --> 00:03:37,280
access tenant but there's more that can be done beyond simple smoke and mirrors

51
00:03:34,640 --> 00:03:41,599
misdirection first up is encryption which is a way of using a tool to

52
00:03:39,120 --> 00:03:46,319
require password access to the files or folders that you mark for protection

53
00:03:44,080 --> 00:03:49,599
compression tools like 7-zip can encrypt archives or if you want something with

54
00:03:48,000 --> 00:03:54,799
more options than that you can use truecrypt 7.1 a yes the truecrypt

55
00:03:52,720 --> 00:03:59,040
project was more or less abandoned but research into the code continues from

56
00:03:57,360 --> 00:04:03,040
the gibson research corporation who insists that truecrypt is actually still

57
00:04:00,640 --> 00:04:07,280
safe to use and through two phases of an audit still have not found any

58
00:04:04,799 --> 00:04:11,120
significant cryptographic problems next is the method of using a virtual machine

59
00:04:09,439 --> 00:04:15,120
a completely separate operating system running from within a host operating

60
00:04:13,360 --> 00:04:19,280
system this is still susceptible to certain key loggers and packet sniffers

61
00:04:17,359 --> 00:04:22,720
but as long as you have a habit of shutting down your virtual machine when

62
00:04:20,959 --> 00:04:26,160
you walk away to the bathroom it can't hurt

63
00:04:24,000 --> 00:04:29,759
one issue with both encryption and virtual machines is that if the

64
00:04:27,840 --> 00:04:34,240
individual searching for your files is familiar with tools like spaceniffer and

65
00:04:31,759 --> 00:04:38,880
winderstat they can easily see the large single files associated with virtual

66
00:04:36,320 --> 00:04:43,360
drives and encrypted folders so next is a form of physical security this would

67
00:04:41,280 --> 00:04:46,960
keep your data on a storage device that isn't always attached to your computer

68
00:04:44,880 --> 00:04:50,479
either a flash drive that you can easily hide these are available in astonishing

69
00:04:48,880 --> 00:04:54,880
capacities these days and can be encrypted as well or an internal storage

70
00:04:53,120 --> 00:04:59,919
device like a hard drive that sits inside your computer and is just usually

71
00:04:57,520 --> 00:05:04,160
unplugged the hard drive solution can be quite easy to do if you mix it with the

72
00:05:02,000 --> 00:05:07,440
hot swap feature which is probably found on your motherboard which allows you to

73
00:05:05,840 --> 00:05:11,680
hot swap SATA devices while your computer is running this would result in

74
00:05:09,680 --> 00:05:16,720
the awesome situation of having the data be impossible to find unless someone

75
00:05:14,080 --> 00:05:21,120
plugs in an internal drive which is pretty sneaky so whatever your preferred

76
00:05:18,960 --> 00:05:25,680
method of content consumption while whacking your meat there's some way to

77
00:05:23,199 --> 00:05:29,919
help hide it if you feel you need to and of course most of these methods can be

78
00:05:27,680 --> 00:05:33,759
used for any type of file so whatever you're into i'm sure there's some way to

79
00:05:31,919 --> 00:05:36,560
accommodate that thanks for watching guys if this video

80
00:05:35,199 --> 00:05:40,320
sucked you know what to do but if it was awesome get subscribed hit the like

81
00:05:38,479 --> 00:05:44,639
button or even consider supporting us directly by using our affiliate code to

82
00:05:42,240 --> 00:05:47,840
shop on amazon for things you might use for things that we talked about in this

83
00:05:46,080 --> 00:05:50,880
video buying a cool t-shirt like this one with a direct monthly contribution

84
00:05:49,759 --> 00:05:55,520
and now that you're done doing all of that stuff you're probably wondering what to watch next so instead of going

85
00:05:53,759 --> 00:05:58,720
to that other stuff we were talking about click the little button in the top

86
00:05:56,880 --> 00:06:03,560
right hand corner to check out a video where i review the ultimaker 2 extended
