How to Hide Your Porn
Linus Tech Tips
·Linus Tech Tips
·2016-05-06
·
1,189 words · ~5 min read
0:00
so loads of people enjoy their alone time but you don't necessarily want
0:04
people knowing about what you watch while wasting kleenex polishing your
0:09
trophy so what can you do if you're streaming online you can always use
0:13
private browsing but there's ways to attract your activities in spite of that
0:17
and if your preferred medium is locally stored on your computer there are many
0:20
dangers there as well so in this video we'll show you ways to keep your sausage
0:24
flicking material private whether you stream your content or watch it locally
0:29
give the video a like if you want to see us test how modern hardware plays old
0:33
hardcore games like crisis one and witcher one
0:45
so i'm sure a horde of chicken chokers are going to comment about how they will
0:49
run their browser in private mode whenever they want to watch content
0:53
while peeling their bananas and they're right to a certain degree in today's day
0:57
and age streaming your content or holding physical pictures documents or
1:01
even video in say a cloud storage account is often the best way to go if
1:06
you're trying to hide it from friends and family because it largely keeps the
1:09
data off your computer but it isn't perfect there are a number of ways to
1:14
track this however like key loggers stealthy background applications that
1:18
can record your typing and transmit it externally to someone else and packet
1:22
sniffers like wireshark that analyze your network traffic now to be fair
1:26
these things could only really be in place if someone with a fair amount of
1:30
technical prowess had access to your computer or your network but it's
1:34
something to consider nonetheless comparing a packet sniffer is rather
1:37
simple you can just run a vpn encrypting your traffic but if someone has direct
1:41
access to your computer for almost any period of time they can easily install
1:45
something like a key logger or in the event that your carelessness left your
1:50
incognito browser window open simply look at your screen and see what you'd
1:54
been up to so how do you avoid all that without
1:57
being obvious and paranoid about people touching your computer here's a cool
2:01
idea use a separate device for that a laptop tablet phone or even desktop can
2:06
all be used and if you follow our three tenets when it comes to said device you
2:10
shouldn't have any problems it should be one fast to access two anonymous by
2:15
logging in with throwaway accounts and using a vpn and three private through
2:20
physically hiding it by the way we don't really recommend under the mattress it's
2:24
kind of obvious it's from these principles that we derive our names for
2:28
these devices fap tops phablets fapones
2:31
and fappooters now onto local storage protection stage
2:35
one of this is to just hide it put it somewhere people don't commonly go like
2:39
system folders or app data another simple way to do this is to just
2:43
technically hide it go into folder properties and click the hidden check
2:47
box but as many of you know this is still very easy to find so another minor
2:51
step that you can make is to make it invisible by going into properties
2:55
making its folder icon blank then renaming it to blank by holding alt and
2:59
then typing zero one six zero what this
3:02
does it is it removes the name and the icon for the folder or file the problem
3:07
with that is that it leaves a blank spot which may actually stand out more than a
3:12
clever name and realistically people can still find these pretty easily if
3:16
they're looking for them you can go through the process of changing the extensions and names for all your files
3:21
through a batch process but that's frustrating doesn't completely protect
3:24
them anyways and it's time consuming which is a violation of our fast to
3:30
access tenant but there's more that can be done beyond simple smoke and mirrors
3:34
misdirection first up is encryption which is a way of using a tool to
3:39
require password access to the files or folders that you mark for protection
3:44
compression tools like 7-zip can encrypt archives or if you want something with
3:48
more options than that you can use truecrypt 7.1 a yes the truecrypt
3:52
project was more or less abandoned but research into the code continues from
3:57
the gibson research corporation who insists that truecrypt is actually still
4:00
safe to use and through two phases of an audit still have not found any
4:04
significant cryptographic problems next is the method of using a virtual machine
4:09
a completely separate operating system running from within a host operating
4:13
system this is still susceptible to certain key loggers and packet sniffers
4:17
but as long as you have a habit of shutting down your virtual machine when
4:20
you walk away to the bathroom it can't hurt
4:24
one issue with both encryption and virtual machines is that if the
4:27
individual searching for your files is familiar with tools like spaceniffer and
4:31
winderstat they can easily see the large single files associated with virtual
4:36
drives and encrypted folders so next is a form of physical security this would
4:41
keep your data on a storage device that isn't always attached to your computer
4:44
either a flash drive that you can easily hide these are available in astonishing
4:48
capacities these days and can be encrypted as well or an internal storage
4:53
device like a hard drive that sits inside your computer and is just usually
4:57
unplugged the hard drive solution can be quite easy to do if you mix it with the
5:02
hot swap feature which is probably found on your motherboard which allows you to
5:05
hot swap SATA devices while your computer is running this would result in
5:09
the awesome situation of having the data be impossible to find unless someone
5:14
plugs in an internal drive which is pretty sneaky so whatever your preferred
5:18
method of content consumption while whacking your meat there's some way to
5:23
help hide it if you feel you need to and of course most of these methods can be
5:27
used for any type of file so whatever you're into i'm sure there's some way to
5:31
accommodate that thanks for watching guys if this video
5:35
sucked you know what to do but if it was awesome get subscribed hit the like
5:38
button or even consider supporting us directly by using our affiliate code to
5:42
shop on amazon for things you might use for things that we talked about in this
5:46
video buying a cool t-shirt like this one with a direct monthly contribution
5:49
and now that you're done doing all of that stuff you're probably wondering what to watch next so instead of going
5:53
to that other stuff we were talking about click the little button in the top
5:56
right hand corner to check out a video where i review the ultimaker 2 extended