How to Hide Your Porn

Linus Tech Tips ·Linus Tech Tips ·2016-05-06 · 1,189 words · ~5 min read
Floatplane YouTube

Transcript

JSON SRT VTT 86
0:00 so loads of people enjoy their alone time but you don't necessarily want
0:04 people knowing about what you watch while wasting kleenex polishing your
0:09 trophy so what can you do if you're streaming online you can always use
0:13 private browsing but there's ways to attract your activities in spite of that
0:17 and if your preferred medium is locally stored on your computer there are many
0:20 dangers there as well so in this video we'll show you ways to keep your sausage
0:24 flicking material private whether you stream your content or watch it locally
0:29 give the video a like if you want to see us test how modern hardware plays old
0:33 hardcore games like crisis one and witcher one
0:45 so i'm sure a horde of chicken chokers are going to comment about how they will
0:49 run their browser in private mode whenever they want to watch content
0:53 while peeling their bananas and they're right to a certain degree in today's day
0:57 and age streaming your content or holding physical pictures documents or
1:01 even video in say a cloud storage account is often the best way to go if
1:06 you're trying to hide it from friends and family because it largely keeps the
1:09 data off your computer but it isn't perfect there are a number of ways to
1:14 track this however like key loggers stealthy background applications that
1:18 can record your typing and transmit it externally to someone else and packet
1:22 sniffers like wireshark that analyze your network traffic now to be fair
1:26 these things could only really be in place if someone with a fair amount of
1:30 technical prowess had access to your computer or your network but it's
1:34 something to consider nonetheless comparing a packet sniffer is rather
1:37 simple you can just run a vpn encrypting your traffic but if someone has direct
1:41 access to your computer for almost any period of time they can easily install
1:45 something like a key logger or in the event that your carelessness left your
1:50 incognito browser window open simply look at your screen and see what you'd
1:54 been up to so how do you avoid all that without
1:57 being obvious and paranoid about people touching your computer here's a cool
2:01 idea use a separate device for that a laptop tablet phone or even desktop can
2:06 all be used and if you follow our three tenets when it comes to said device you
2:10 shouldn't have any problems it should be one fast to access two anonymous by
2:15 logging in with throwaway accounts and using a vpn and three private through
2:20 physically hiding it by the way we don't really recommend under the mattress it's
2:24 kind of obvious it's from these principles that we derive our names for
2:28 these devices fap tops phablets fapones
2:31 and fappooters now onto local storage protection stage
2:35 one of this is to just hide it put it somewhere people don't commonly go like
2:39 system folders or app data another simple way to do this is to just
2:43 technically hide it go into folder properties and click the hidden check
2:47 box but as many of you know this is still very easy to find so another minor
2:51 step that you can make is to make it invisible by going into properties
2:55 making its folder icon blank then renaming it to blank by holding alt and
2:59 then typing zero one six zero what this
3:02 does it is it removes the name and the icon for the folder or file the problem
3:07 with that is that it leaves a blank spot which may actually stand out more than a
3:12 clever name and realistically people can still find these pretty easily if
3:16 they're looking for them you can go through the process of changing the extensions and names for all your files
3:21 through a batch process but that's frustrating doesn't completely protect
3:24 them anyways and it's time consuming which is a violation of our fast to
3:30 access tenant but there's more that can be done beyond simple smoke and mirrors
3:34 misdirection first up is encryption which is a way of using a tool to
3:39 require password access to the files or folders that you mark for protection
3:44 compression tools like 7-zip can encrypt archives or if you want something with
3:48 more options than that you can use truecrypt 7.1 a yes the truecrypt
3:52 project was more or less abandoned but research into the code continues from
3:57 the gibson research corporation who insists that truecrypt is actually still
4:00 safe to use and through two phases of an audit still have not found any
4:04 significant cryptographic problems next is the method of using a virtual machine
4:09 a completely separate operating system running from within a host operating
4:13 system this is still susceptible to certain key loggers and packet sniffers
4:17 but as long as you have a habit of shutting down your virtual machine when
4:20 you walk away to the bathroom it can't hurt
4:24 one issue with both encryption and virtual machines is that if the
4:27 individual searching for your files is familiar with tools like spaceniffer and
4:31 winderstat they can easily see the large single files associated with virtual
4:36 drives and encrypted folders so next is a form of physical security this would
4:41 keep your data on a storage device that isn't always attached to your computer
4:44 either a flash drive that you can easily hide these are available in astonishing
4:48 capacities these days and can be encrypted as well or an internal storage
4:53 device like a hard drive that sits inside your computer and is just usually
4:57 unplugged the hard drive solution can be quite easy to do if you mix it with the
5:02 hot swap feature which is probably found on your motherboard which allows you to
5:05 hot swap SATA devices while your computer is running this would result in
5:09 the awesome situation of having the data be impossible to find unless someone
5:14 plugs in an internal drive which is pretty sneaky so whatever your preferred
5:18 method of content consumption while whacking your meat there's some way to
5:23 help hide it if you feel you need to and of course most of these methods can be
5:27 used for any type of file so whatever you're into i'm sure there's some way to
5:31 accommodate that thanks for watching guys if this video
5:35 sucked you know what to do but if it was awesome get subscribed hit the like
5:38 button or even consider supporting us directly by using our affiliate code to
5:42 shop on amazon for things you might use for things that we talked about in this
5:46 video buying a cool t-shirt like this one with a direct monthly contribution
5:49 and now that you're done doing all of that stuff you're probably wondering what to watch next so instead of going
5:53 to that other stuff we were talking about click the little button in the top
5:56 right hand corner to check out a video where i review the ultimaker 2 extended