background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Как защитить свой телефон от слежки. Как защитить смартфон от взлома государством и Пегаса."

input logo icon
Video tags
|

Video tags

Защита
смартфоны
смартфон
телефон
android
iphone
ios
телефоны
Пегас
безопасность
спецслужбы
США
РФ
прослушка
слежка
вирусы
сноуден
Linux
pinephone
Librem
mms
VPN
MITM
атаки
хакеры
кейлогеры
ВПН
фаервол
f-droid
Wi-Fi
DNS
уязвимости
recovery
ПЭМИН
мессенджеры
ПК
патчи
утечки
ФСБ
социальная инженерия
КГБ
sunandreas
sunbook
блог
TOR browser
даркнет
ФБР
ЦРУ
смартфон защищенный
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:05
Greetings, I bring to your attention
00:00:08
perhaps the best videos in the world in
00:00:10
terms of brevity and information content, here is
00:00:12
a link for you on ensuring acceptable
00:00:15
security on a smartphone in some
00:00:18
situations, this guide can
00:00:20
even be useful against the toughest
00:00:23
hackers in the world;
00:00:25
additionally, see useful information
00:00:27
on my channel in a separate
00:00:30
album about smartphone protection link under
00:00:33
this video
00:00:34
in the first year of the existence of my channel
00:00:37
I released a legendary video
00:00:38
called Sambuc Affairs general algorithm
00:00:41
ensuring information security
00:00:44
today the launch topic is much worse
00:00:47
my instructions do not give a 100%
00:00:50
guarantee but will make wiretapping and
00:00:52
targeted hacking extremely difficult
00:00:54
in practice so let's do it let's go through
00:00:58
the points of the security algorithm,
00:01:00
I will say in advance that it is a big
00:01:03
plus if you are not in the area of ​​interest of
00:01:06
US services,
00:01:07
first, do not use smartphones with
00:01:10
pre-installed operating
00:01:12
systems in rap for which the state
00:01:14
has obliged to implement a pre-installed software
00:01:17
application, it is better to buy smartphones
00:01:20
abroad, and if you bought a device in the
00:01:23
territory and regime federation, then be
00:01:25
sure to reflash it with the firmware
00:01:27
that I voiced and will continue to voice
00:01:30
on the channel, respectively, the second point is to
00:01:32
install it, use an ethical
00:01:35
operating system without google one and
00:01:37
without services that interact and
00:01:39
send data to google apple and
00:01:42
other corporations that produce regular
00:01:45
firmware, I talked about in separate
00:01:46
issues and I also want to say that a
00:01:48
safe future should be salted by
00:01:51
smartphones, the director may be
00:01:54
strange, but do not insert or
00:01:56
use a SIM card in your smartphone, it cannot be
00:01:59
ruled out that until now only by
00:02:00
sending a specially prepared message
00:02:03
to your smartphone you can have access to For
00:02:06
your devices
00:02:08
given by us,
00:02:09
set the background to airplane mode, although this is not a
00:02:13
panacea for
00:02:14
connecting to the Internet, use a
00:02:17
portable 4g ​​modem, it will be an
00:02:19
additional barrier to attack,
00:02:21
relatively speaking from the
00:02:23
Internet provider, such a mobile 4g
00:02:26
modem should not have a camera, a
00:02:28
microphone, or other unnecessary modules for
00:02:31
4g modems with mobile Internet,
00:02:34
use a SIM card not issued to you,
00:02:37
if you do not use
00:02:39
secure tunnels like rippain to access the Internet, then the first
00:02:42
connection to the Internet to
00:02:45
install the first programs is better
00:02:47
done not from your home or from a
00:02:50
place where they may be waiting for you hackers
00:02:52
are capable of carrying out a sophisticated mid-him
00:02:54
attack if you have a poor factory
00:02:57
system on your smartphone, remove the keylogger
00:03:00
that may be installed on you by
00:03:02
default, namely, replace the keyboard
00:03:05
with an epic one, which I talked about in a
00:03:07
separate video, the
00:03:09
next step is to install all the necessary
00:03:12
programs among the very first applications.
00:03:15
oral and drunk client and firewall
00:03:17
recommend that for the first installation of
00:03:19
applications on a smartphone here, have
00:03:22
local saved installation files of the
00:03:24
primary programs, including not
00:03:27
only vpn firewall, but also an
00:03:30
application store, for example, like f droid and so on,
00:03:34
use better here a firewall that
00:03:37
works at the kernel level of the system in new
00:03:40
versions In android you can, in the settings,
00:03:42
selectively block the traffic of many
00:03:44
applications, but still not all of them are
00:03:47
blocked at the hydra level, this is more
00:03:49
severe and reliable, but in general I talked about a
00:03:52
variety of useful mobile
00:03:53
applications in separate
00:03:55
issues, but in order to block
00:03:57
traffic at the system kernel level, it is
00:03:59
necessary, unfortunately obtaining
00:04:02
root rights, how to do this is quite easy
00:04:04
and safe, see a separate issue
00:04:07
that should not be updated,
00:04:10
but time does not allow much when
00:04:13
setting up a firewall, try to allow
00:04:15
access to the Internet to as
00:04:17
few applications as possible, do not allow access to the
00:04:19
network and many system utilities,
00:04:21
which is possible that an
00:04:23
old vulnerability has a normal
00:04:25
phenomenon would be if, after brutally
00:04:27
setting up the firewall, your system
00:04:29
erroneously tells you that it supposedly does not
00:04:32
have a network connection, while
00:04:34
in fact we can successfully
00:04:36
connect to a Wi-Fi connection on a
00:04:38
mobile modem or router if you
00:04:41
can do without a number of applications then
00:04:44
you can not allow access to which
00:04:46
system applications and so on, the point is
00:04:50
that your system operates at a
00:04:52
satisfactory level without access to the
00:04:55
network; many system applications are a
00:04:57
utility that in theory can have
00:05:00
remote, that is, remote
00:05:02
vulnerabilities; it is important that the search and
00:05:04
exploitation of vulnerabilities is usually
00:05:06
carried out for popular third-party
00:05:08
applications and standard
00:05:10
widespread system elements of
00:05:12
utilities,
00:05:14
be sure to use lepen on an
00:05:16
ongoing basis, you carry your network
00:05:19
traffic outside of potentially
00:05:21
unsafe countries, there are known cases of
00:05:23
disclosure of dns vulnerabilities iPhone and other
00:05:27
developments involved in the exchange of data in the
00:05:30
city that we use every day for
00:05:32
many years and from the very emergence of
00:05:35
technologies a number protocols have or
00:05:37
have had their own vulnerabilities, we
00:05:39
will not dwell on the details,
00:05:41
but there are known vulnerabilities that
00:05:43
allowed or allow to intercept and
00:05:46
replace traffic, so vpn with decent
00:05:48
encryption user authorization mechanisms can be
00:05:51
protected thanks to crypto, the
00:05:53
tool will not only count the
00:05:55
traffic substitution, in addition to simple
00:05:58
settings in the system to wrap up
00:06:00
all traffic all applications and pentan, or
00:06:02
I strongly recommend doing this
00:06:05
using a firewall running at the
00:06:08
kernel level, this is the most rigid and reliable than
00:06:11
using different android settings,
00:06:13
which still do not radically
00:06:14
reduce application traffic. I’m not drunk about
00:06:17
which firewall which application to
00:06:20
use for these prices, I will announce in in a
00:06:22
separate video about mobile applications, the
00:06:25
next step may not be particularly
00:06:28
convenient, but it’s hardcore and is
00:06:30
more suitable for those who do not use
00:06:32
a smartphone as a regular data storage
00:06:34
and so immediately after installing the
00:06:36
operating system and all the necessary
00:06:38
programs after you have installed
00:06:42
and configured the firewall also, all your
00:06:44
boarding schools are wrapped purely in vpn,
00:06:46
after that, using recovery, create
00:06:50
snapshots of your operating system and
00:06:52
regularly, before installing security updates,
00:06:55
roll back the system to the created
00:06:58
snapshots, that is, for example, immediately after
00:07:00
installing ethical firmware on a smartphone,
00:07:02
create a snapshot of the system, that is, a copy of
00:07:05
the system and and so to speak, backup and consider
00:07:09
this image as a standard and clean and
00:07:11
you store such a snapshot of the system on a
00:07:13
separate external flash drive for
00:07:15
direct connection of a flash drive to a smartphone, it
00:07:18
is useful to have an aut g adapter for those
00:07:21
who are not aware of recovery is the software
00:07:23
part of your smartphone that runs
00:07:25
in it android and allows you to
00:07:28
manipulate android after you have
00:07:30
created a snapshot of the system, then a
00:07:33
security update patch has been released for your
00:07:35
operating system, before you start
00:07:37
updating the system, first roll back and
00:07:39
restore the state of your iOS
00:07:42
using a previously saved snapshot, and
00:07:44
then immediately update the system in
00:07:47
one of the ways namely, either by
00:07:49
air, that is, via the Internet or
00:07:51
using a downloaded update file, for
00:07:53
now and then install using
00:07:55
recovery and immediately after the update
00:07:58
after installing almost security,
00:08:00
take a new snapshot of the system that
00:08:03
you consider clean again and otherwise scrap until the
00:08:05
next updates are released
00:08:07
security and so cyclically every month
00:08:10
as an android update, as a rule,
00:08:13
they come out no less often than and no more often than 1
00:08:15
month, and as soon as updates stop coming to
00:08:18
your system, immediately change
00:08:20
your grip.
00:08:21
I want to tell everyone sitting on factory
00:08:23
operating systems to understand
00:08:26
that basic firmware often has
00:08:28
significantly longer period of support
00:08:31
in terms of security
00:08:33
based on regularly update the UAZ
00:08:36
you receive security updates at least once a month
00:08:38
exactly once a
00:08:40
month in the first half of the month google
00:08:43
publishes a security patch but remember
00:08:46
how I said that you should take a closer look at the
00:08:48
blade with a smartphone
00:08:50
will not be amiss if you are not
00:08:53
lazy and in general, once a few months
00:08:55
you will be able to completely reflash your
00:08:58
smartphone system encryption is not over
00:09:01
what protection use additional
00:09:03
encryption programs if your
00:09:05
smartphone does not have a hardware
00:09:07
microphone, then block the microphone for the
00:09:09
appropriate time with programs
00:09:11
that I talked about separately known
00:09:14
vulnerabilities in popular instant messengers
00:09:16
that allowed you to have access to
00:09:18
device without even any action
00:09:20
on the part of the user than a popular
00:09:22
messenger and more occupy the pit will be the
00:09:25
search for vulnerabilities and the development of
00:09:26
tools and so for it,
00:09:27
accordingly, try not to
00:09:29
use particularly popular and planted,
00:09:32
try to keep secret what
00:09:35
systems and applications you use to make it more
00:09:38
difficult for attackers to
00:09:39
get close to you if you use a browser, then
00:09:42
replace its identifier and
00:09:44
user-agent so that the sites and
00:09:47
social networks you visit do not know exactly what browser you
00:09:49
are using,
00:09:50
respectively, and the wiki vulnerabilities you
00:09:52
have, and in addition to the browser
00:09:54
there is a separate video for the channel,
00:09:57
try to keep
00:09:59
yours secret as much as possible contact information some in
00:10:02
messengers ID try not
00:10:04
to use messengers that require
00:10:06
linking to a phone number and in general
00:10:08
popular proprietary messenger
00:10:10
vulnerabilities for which they are most willingly
00:10:12
searched I hack into their offices these searches are
00:10:15
paid for them do not relax base of
00:10:19
phone numbers unique periodically
00:10:21
change SIM cards of your cell
00:10:23
phones but you remember in the cellular
00:10:26
networks themselves this vulnerability and there are known cases of
00:10:28
intercontinental wiretapping through a
00:10:31
regular cell phone that does not have an
00:10:33
Internet connection, more details
00:10:36
about this in a separate issue
00:10:38
if you have no options, you need to
00:10:40
use unethical programs and
00:10:42
messenger on a smartphone
00:10:45
in this case install use
00:10:47
them not in the main part of the system, but
00:10:49
isolated from the main data, namely
00:10:53
in the so-called worker profile, to
00:10:56
isolate and operate dubious
00:10:57
applications, you can use the
00:10:59
ruins router application or also
00:11:02
insula, they will be able to install
00:11:05
the application in an isolated space
00:11:06
not in the main system, for such
00:11:09
application isolation it is useful to have a
00:11:11
smartphone not with less than four
00:11:13
gigabytes of RAM, or better with
00:11:15
parts more for ordinary cellular
00:11:18
GSM communications, use a good old
00:11:20
push-button phone with the ability to
00:11:23
remove the battery, or use a case that
00:11:25
insulates
00:11:28
all radio communications in sensitive moments. I remind you that
00:11:31
the smartphone in which instant
00:11:32
messengers are installed and your photos are stored
00:11:35
must be turned off from communication with cell
00:11:37
towers as a menu using
00:11:40
flight modes, or better yet, at the hardware
00:11:42
level, it can be useful to disable the
00:11:44
ability to receive mms and the operation of
00:11:47
system programs of services for
00:11:49
emergency situations, these are all sorts of destination applications
00:11:52
for jeans awards, also do not
00:11:55
forget that our very precise
00:11:57
location can be determined by the
00:11:59
surrounding bye-bye. remember that even
00:12:01
if you surrounded the media with drunkenness and
00:12:04
even turned off the gsm module, the
00:12:06
location can still be
00:12:07
determined radically accurately about this on
00:12:10
my channel there are separate videos
00:12:13
so don’t forget to think about what
00:12:16
applications you install
00:12:18
at the end of the story about the technical part
00:12:20
I want to remind you that you receive information from
00:12:23
a device with so far, including by role,
00:12:25
correspondence can be done without penetrating into it
00:12:28
by pressing keys 2 disk heads Morgan
00:12:31
indicators and so on, maybe in
00:12:34
theory I used it, but more practically
00:12:37
I talked about the method of collecting information at a distance
00:12:39
in a separate issue about the poem of
00:12:41
communication with what to whom -it will be useful not to
00:12:44
forget about the Faraday cage and case
00:12:48
[music]
00:12:54
I voiced important technical aspects
00:12:57
of security, and a more narrow one
00:13:00
was discussed about this in other issues on the
00:13:02
channel after technical points, you
00:13:04
should be reminded about human vulnerabilities
00:13:06
about social engineering, you can view the password
00:13:09
or correspondence over your shoulder or
00:13:12
a camera indoors in order to have access to
00:13:15
your devices, you can send a person to you
00:13:17
who will want to become a
00:13:20
good friend or lover, if the circle of
00:13:23
your contacts is limited, you are not a particularly
00:13:26
open person and in your life you don’t have many people
00:13:28
in contact with, then it becomes
00:13:30
much more difficult to send someone
00:13:32
imperceptibly, therefore, analyze the
00:13:34
words and actions of those with whom you have to
00:13:37
intersect each time, note for
00:13:39
yourself
00:13:40
if a person starts a conversation on topics of
00:13:42
your interests or mistakenly believes
00:13:45
that these are your interests based on their
00:13:47
police or intelligence service
00:13:50
stereotypes,
00:13:51
note if entering into a contact
00:13:54
glide is unnatural if the goal is worth it not
00:13:57
to get in touch with you, but simply
00:13:59
to find out in advance what kind of
00:14:01
person you are; it may be to test your
00:14:03
reaction to certain situations;
00:14:04
conflicts between couples; possible provocative
00:14:07
actions towards you; before the final
00:14:10
act of the work of the authorities, there should be a collection of
00:14:12
information and characteristics of the person,
00:14:14
especially if about a person you can’t learn
00:14:16
anything worthwhile from social networks in which he does
00:14:19
n’t say anything about himself here,
00:14:22
not only from the stories we have encountered dust,
00:14:24
so to speak, with psychologists in
00:14:27
uniform, I won’t say in which or in
00:14:29
which countries, but usually I made conclusions
00:14:31
some time after the analysis already past
00:14:34
events and I want to tell you that it is often
00:14:36
advantageous to look like a naive and not
00:14:39
understanding fool, it lulls the vigilance of the
00:14:42
opposite side, I have repeatedly
00:14:44
observed failures of people in the service, the
00:14:47
reason for which was their underestimation, an
00:14:49
arrogant attitude towards one’s object as an
00:14:52
incomprehensible fool who supposedly does
00:14:54
not understand what is happening I don’t want to
00:14:57
help anyone, but very often the failure of
00:14:59
an operation occurs from its own
00:15:01
pattern. Psychologists in uniform
00:15:04
can often play into the sum of
00:15:06
the performance, a feeling of their superiority and
00:15:08
imaginaryness that they are performing a
00:15:11
theatrical act around their object, supposedly without
00:15:13
his knowledge, and performances can be
00:15:16
performed both in the presence of a person.
00:15:17
outside his field of vision they say such
00:15:20
words in public, I may have caused
00:15:22
additional caution
00:15:23
towards myself, but not saying anything would not be
00:15:26
good for honest and
00:15:28
worthy viewers, especially those of a young
00:15:30
age,
00:15:31
after a conversation with a former KGB officer
00:15:34
or not, I don’t know my income
00:15:37
is included in the word observation of which and I
00:15:40
wish you to be an attentive observer
00:15:43
and surround the process, perhaps if
00:15:45
you are an interesting person around you,
00:15:47
play a theatrical
00:15:49
and, in the end, for especially serious
00:15:52
individuals of whom there are probably only a few, I want to
00:15:55
say that it is better to live in your own mansion in a
00:15:58
private house with constant monitoring
00:16:00
or rent at least three floors of an
00:16:03
apartment building, although an
00:16:04
apartment building is generally a bad
00:16:06
option without unnecessary details,
00:16:09
but I will say that I, an absolutely modest
00:16:12
person, have had to repeatedly
00:16:14
deal with both technical and
00:16:17
social operations in my life, my address, and
00:16:20
unfortunately I learned in my life what
00:16:22
information violence, harassment, so to speak, is
00:16:24
and the destruction of private
00:16:27
life from which it is difficult even to escape, I do
00:16:30
n’t wish this on anyone, but I hope that for
00:16:32
some bright individuals who need
00:16:35
such information, our channel
00:16:37
will be able to help in some way, at least not to ruin
00:16:40
your life for years due to rash
00:16:42
actions, while there may be
00:16:45
people who that’s what they expect when you
00:16:47
stumble,
00:16:49
I expect your wishes on the topics of future
00:16:52
issues, and I wish all decent people
00:16:55
safety and see you again
00:16:59
[music]

Description:

Как защитить свой смартфон от взлома. Как защитить свой телефон от слежки. как защитить смартфон от слежки. как защитить смартфон от прослушки. как защитить смартфон от вирусов. сноуден как защитить смартфон от прослушки, смартфон защищенный, смартфон защищенный от слежки, смартфон безопасный режим, самый безопасный смартфон 2022. https://www.youtube.com/watch?v=TQC1zLgXEcg Дополнения к браузеру https://www.youtube.com/watch?v=3O78GcYGSkM Лучшие приложения для смартфона https://www.youtube.com/watch?v=8Q-03a_4jYw Какой безопасный смартфон выбрать https://www.youtube.com/watch?v=q3JhhGeKvVo Съём, чтение информации с устройств на расстоянии https://www.youtube.com/watch?v=LoQYuZFVhns Прослушка телефона с любого континента https://www.youtube.com/watch?v=Tiohs-bvEZw SunbooK https://www.youtube.com/watch?v=miMHCQ-EwVs Как определить точное местоположение с отключенным GSM модулем, за ВПН и тд. https://www.youtube.com/watch?v=bG1b_g8e-8s Как отключить микрофон на смартфоне https://www.youtube.com/watch?v=eDdha5VfHTM Какой ноутбук выбрать, купить Озвучены программы Shelter и Insular.

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Как защитить свой телефон от слежки. Как защитить смартфон от взлома государством и Пегаса." video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Как защитить свой телефон от слежки. Как защитить смартфон от взлома государством и Пегаса." video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Как защитить свой телефон от слежки. Как защитить смартфон от взлома государством и Пегаса." video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Как защитить свой телефон от слежки. Как защитить смартфон от взлома государством и Пегаса." video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Как защитить свой телефон от слежки. Как защитить смартфон от взлома государством и Пегаса."?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Как защитить свой телефон от слежки. Как защитить смартфон от взлома государством и Пегаса."?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.