I QUIT Online Privacy. This is why.

I'm fed up. As a privacy advocate who uses an iPhone and software that isn't open source, I realize that I don't fit the extreme standard of privacy and security. Here's what I have to say about that. Be sure to make the important change of securing your accounts with a security key. Get $5 off here: https://www.allthingssecured.com/yubikey5off

Dive deeper into my views of privacy and security?
▶ Copy my account security strategy: https://www.youtube.com/watch?v=XOvapxmgPjc

▶ 12 Privacy & Security tools I use EVERY DAY: https://www.youtube.com/watch?v=XNOAOQktG6U

▶ 7 Cybersecurity tips NOBODY tells you: https://www.youtube.com/watch?v=Uy60wy20ADE

If you care about your personal security and privacy online, download my free security checklist here:
✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/


🔹🔹What to Watch Next🔹🔹

We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next:

✅ Best Secure Email Providers TESTED: https://www.youtube.com/watch?v=72eG84gGR0s

✅ Best Password Managers TESTED: https://www.youtube.com/watch?v=BsVkVa0n0T0

✅ How to use Pseudonyms for better privacy: https://www.youtube.com/watch?v=eWeXGPI7XOY


🔹Support All Things Secured (Recommendations)🔹
If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support!

✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass

✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt

✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey

✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt

✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt


*********************
Video Timestamps
*********************
0:00 - Privacy is pointless
1:06 - Privacy and the book of Ecclesiastes
1:43 - The Dangerous Privacy Fallacy
2:48 - Privacy Reality Check
3:28 - Change your Definition of Online Privacy
4:07 - Step 1: Use Better Privacy Tools
5:11 - Step 2: Improve your Privacy Habits
6:18 - Step 3: Understand your Privacy Priorities
7:43 - Progress over Perfection
*********************

Every day, privacy extremists leave comments and messages on All Things Secured videos explaining how stupid I am. Perhaps they're right. Or perhaps the ideal "privacy" is impossible? Here's my simplified approach to privacy and security that flies in the face of most tech gurus you'll see online.

#cybersecurity #privacyfirst #privacymatters

Tags:

  • online privacy
  • big tech
  • online security
  • privacy matters
  • cybersecurity
  • off the grid
  • privacy awareness
  • information privacy
  • yubico
  • yubikey
  • online privacy and security
  • cyber security
  • privacy tutorial
  • internet privacy
  • privacy on the internet
  • personal privacy
  • big tech privacy
  • open source
  • privacy tools
  • best privacy tools
  • security tools
  • best cybersecurity tools
  • online privacy tips
  • online privacy guide

Comments

@AllThingsSecured
I go back and forth about doing these little &quot;skits&quot; at the beginning, but hey...I guess I&#39;d rather look stupid than be boring :) Hope you enjoyed and resonated with the video this week. Be sure to improve your own security tools by getting $5 off a YubiKey: <a href="https://www.allthingssecured.com/yubikey5off">https://www.allthingssecured.com/yubikey5off</a>
@wdm213
As soon as you started your intro, I was instantly reminded of Ecclesiastes, which while i haven&#39;t really read in a while, still testifies to its relevance and impact. <br>I hope others will pick it up and read it, if for no other reason but to help them understand and accept that control is elusive.
@castironskilletguy
There is a great balance between security and privacy. For the average person this channel is great and hopefully you will get more interested in privacy tech. So for example you can have a google account but ask &quot;am I okay with google reading this email or google doc&quot;. If not then store locally or use a privacy respecting service. This is the ultimate strategy as you can get best of both worlds (as the average man). Awareness is key
@Jessicab-u7c
Interesting take,Good work.
@KR34TUR3
Seems like no matter what direction I head towards in life . God words always finds a way to spread across all my aspects of life .
@StarshipDewdrop
apple is legally required to give all of its users client side information to UK government officials when requested as a direct result of the snoopers charter and that does not just apply to citizens of the UK. <br>if they think you have CSAM they are allowed to look at everything you have and copy all of it apple is also not allowed to tell you that they have done this. <br>and it&#39;s not just Apple every single company that does business with the UK is now required by UK law to do this.
@MARTSAAR-w3d1m
cool
@JulieBlairministries
Proverbs 22:3 &quot;A prudent man foreseeth the evil, and hideth himself: but the simple pass on, and are punished.&quot;
@bupsahn7098
I hardly think a phone plus Linux is particularly radical or difficult.
@peterlawson8563
This is good. I&#39;ve been doing as you say wi the hidden email since I saw your video on the same
@TapNPlayLT
Finally, someone said it! This whole privacy madness has become such an overblown bubble – I completely agree with your point of view. Your videos weren’t just interesting, they were clearly well thought out and full of real content, not just empty talk. Unlike, for example, Eon Braxman Tech, who mostly just tells stories without any real facts or backing. It’s a real shame you’ve decided to stop making videos, but I totally understand your decision. Like you said – this privacy hysteria needs to stop. There has to be balance, because right now it’s just turning into nonsense. What’s funniest is that these so-called “experts” upload their content to the “big evil” YouTube, earn money into their personal accounts, use smartphones, and still try to demonize the whole system. Your take on it all was spot on – I’m really glad someone finally said what so many people are silently thinking.
@st939
Even in the middle of nowhere with no electricity there&#39;s no privacy. Eye in the sky.
@Econ_With_Eggs
I think the biggest issue I have with using more encrypted messaging app 😣 is the lack of people I have to message with them
@Econ_With_Eggs
I love this :)
@unprocessed_human
Apps never close if anybody think they do
@musopaul5407
The fact that you are even having to make this video is a sign of how insane our society has become.
@DarkLink606
Didn&#39;t expect the Eclesiastes here. But good idea. I&#39;m an atheist, this is the single book of the Bible I appreciate. For some reason, the Portuguese translation (one of them) changes &quot;meaningless&quot; to &quot;vanity&quot;. Still somewhat applicable to digital privacy.
@fuseteam
There&#39;s also a difference between anonymity, pseudonymity and privacy<br><br>Privacy: your data is only viewable to you and who you intend to show it to, but that doesn&#39;t mean you are untrackable<br>Pseudonymity: your online id is disconnected from your real world id, your activity can still be linked to your online id<br>Anonymity: a separate id for every single service: you are untrackable<br><br>I prefer to keep some level of pseudonymity and like to have more control over my devices so i use linux over windows and ubuntu touch over android. <br><br>However neither will offer anonymity, i still connect to the internet so my ip is still the same and i still use the same online accounts with the same handle across most. <br><br>The most linux and ubuntu touch offer is that your online account is not inexplicably linked to your physical devices
@PatrickBaptist
Whatever you are reading, it&#39;s not the real Bible, you are being deceived.<br>Ecclesiastes 1:1-3<br>&quot;The words of the Preacher, the son of David, king in Jerusalem.<br>Vanity of vanities, saith the Preacher, vanity of vanities; all [is] vanity.<br>What profit hath a man of all his labour which he taketh under the sun?&quot;<br>, it&#39;s nothing what you said, there are many false bibles like there are anti-christs, you need a king James PCE 1769 if you want to study the preserved word of God. You may know about PC security, but you really need to learn more about the Bible vs the copyrighted word of fools you are quoting from. Where in the Bible should we seek counsel from the ungodly? I can show you how your book blasphemes Jesus Christ.<br>I couldn&#39;t listen any further after you parrot the 14th verse in error. I came here for tech talk not to hear about why I don&#39;t read from this other versions. I hope you don&#39;t believe Jesus Christ was a sinner with long hair and a trimmed beard because that could never fulfill the law of Moses friend, in love you need to repent and turn to God that book is leading you astray.
@stranded_mariner7695
It all comes down to your threat model and personal preference, and you have to be realistic about it. I use encryption where I can but accept that not everybody else does or will, I use tor where necessary to search anything that might be sensitive, and I use a virtual box for all my browsing as my threat model here is to avoid malware infection and financial loss. I have given up all social media, because it was just too easy for me to share something I would regret in the future.