background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Анонимность - роскошь современного человека"

input logo icon
Video tags
|

Video tags

деанонимизация
анонимность
vpn
tor
darknet
deepweb
даркнет
даркнэт
дипвеб
Linken's Sphere
tails
whonix
браузер антидетект
система антидетект
анонимность в сети
теория заговора
Эдвард Сноуден
Слежка
шпионаж
пакет яровой
слежка в интернете
прослушка
ip-адрес
dns
компьютер
ИБ
IT
Как защитить себя в интернете
Анонимность в социальных сетях
Система Антидетект
Анонимность TOR
Как стать анонимным в интернете
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:04
Anania, it seems like it’s also not there, but how to download
00:00:07
anonymity
00:00:08
every year questions about anonymity
00:00:11
will turn into another joke, but
00:00:13
remember a few years ago no
00:00:15
one followed us about such strict control on the
00:00:17
Internet, but probably until then Until now they have not
00:00:20
realized that at least somewhere there is freedom
00:00:22
of speech and now they are trying to eradicate it,
00:00:24
or maybe it’s something else in politics:
00:00:27
old voters watch TV,
00:00:30
younger voters watch the Internet,
00:00:32
when there are no old voters, there
00:00:35
will be no one to watch TV, so
00:00:37
you need to control the younger
00:00:39
generation, that’s why and came up with all sorts of
00:00:42
laws for the spring messenger blocking package
00:00:44
for listening to traffic and
00:00:46
many other things, it seems that very
00:00:48
soon if you make the wrong
00:00:50
search query you will be knocked on the
00:00:54
door when we are talking about google and
00:00:55
facebook everything that you write in the
00:00:57
search bar is recorded and saved
00:00:59
forever they don’t ask do you want
00:01:01
it they just do it I rarely
00:01:03
use black material in my videos
00:01:05
but I still want you to
00:01:06
watch it because well I’m lime my
00:01:09
words may not have that much weight but I
00:01:11
support the idea of ​​Edward Snowden, the
00:01:13
man who opened the eyes of the whole world
00:01:16
when someone says don't worry about
00:01:18
it if you have nothing to hide then you have
00:01:20
nothing to be afraid of such people mislead us
00:01:22
they deceive you they take away
00:01:24
your rights and freedoms because
00:01:26
privacy does not mean that you
00:01:28
need to hide something it means protection
00:01:30
a because it’s true that under many videos I
00:01:32
noticed comments where they said yes,
00:01:34
let him control the Internet, I
00:01:37
still have nothing to hide,
00:01:38
these are the people who mislead
00:01:42
other people; the secret of eternal life does not
00:01:44
mean that you should not
00:01:46
hide something; the secret of personal life means
00:01:48
protection; here you can draw an analogy
00:01:51
people like this think like this I won’t
00:01:53
lock the door because they
00:01:55
steal nothing from me these people
00:01:57
give up their right because
00:01:59
their life their freedom of speech is simply
00:02:01
absent they just want
00:02:03
to exist at the moment in it’s hard to
00:02:05
imagine a world where everything will be anonymous
00:02:07
anonymity too there is a limit and states do
00:02:10
n’t want to let us go beyond it
00:02:11
and different organizations
00:02:13
have this or that influence on this, that’s why they
00:02:16
limit access to the young tor clip to an
00:02:18
anonymous messenger, but still
00:02:20
anonymity can be found, it can be created
00:02:23
and it can be deceived
00:02:26
about this and it will be ours video we will talk
00:02:29
about operating systems tails one x
00:02:32
anti-age and anti detect browser many
00:02:35
operating systems that we
00:02:37
trust our information protect our
00:02:40
privacy by watching us the
00:02:42
same google
00:02:43
it has services where it stores all
00:02:45
information about the user
00:02:47
it does not hide it but and he doesn’t
00:02:49
say that by disabling them you won’t lose
00:02:51
any functions but why does he collect this
00:02:55
information your search queries your
00:02:57
location your contacts
00:03:00
so if you are concerned about your
00:03:02
privacy
00:03:03
or you think that your operating
00:03:05
system is stealing your personal data on the
00:03:08
Internet without your permission then
00:03:10
it's time to discard these ac let's
00:03:13
talk about such an operating system
00:03:15
as tails, this is a
00:03:17
real-time linux operating system
00:03:19
that can be run
00:03:20
on almost any computer from a
00:03:22
division and a usb drive and sd cards and
00:03:26
does not leave traces on the computer
00:03:27
that you use to run
00:03:30
the necessary download the image and load it
00:03:32
onto the flash drive, then in bios, set the flash drive
00:03:35
as a boot disk, save the settings
00:03:37
and wait for the OS to load, an
00:03:39
important feature of Tails is
00:03:41
that all outgoing connections are forced to
00:03:44
go through the torus, they
00:03:46
block anonymous connections, the top project
00:03:48
provided financial support for
00:03:50
the development of this operating system,
00:03:52
namely anonymous about stealth was used by the
00:03:55
famous spy Edward Snowden and the
00:03:57
correspondents who collaborated with him,
00:03:59
if you have someone else’s computer, if
00:04:02
you need to make an anonymous exit, all
00:04:04
these leave no traces, then you just need to
00:04:06
boot from a flash drive and
00:04:08
security will be guaranteed after
00:04:10
removing the flash drive, absolutely all data
00:04:13
is destroyed tails leaves no
00:04:15
traces on your computer since it does not
00:04:17
interact with your hard drive 2
00:04:20
operating system one x
00:04:22
operating system consists of two
00:04:24
virtual machines 1 exclusively
00:04:26
manages torus and acts as a gateway
00:04:29
which is called it x ready the other
00:04:31
which is called one x workstation
00:04:33
is on a completely isolated network
00:04:35
only connection is possible through cake
00:04:38
swan ax you can use
00:04:40
the application and run the server anonymously
00:04:42
over the internet dns leaks are impossible
00:04:45
even malware with
00:04:48
root rights will not be able to determine your real
00:04:50
ip address unlike tails won x
00:04:52
is not amnesic both gitov and
00:04:55
workstation they retain their
00:04:57
past state when rebooting, that
00:05:00
is, who didn’t understand, the tails are on a
00:05:02
flash drive, the download can be done
00:05:03
from absolutely any computer, the
00:05:06
flash drive is removed, all data is updated,
00:05:08
the system leaves no traces,
00:05:11
turn one x is installed on the working
00:05:13
version of the virtual machine, and the virtual
00:05:16
machine must be installed on your
00:05:18
OS unix cannot exist as a
00:05:21
separate system outside of another operating
00:05:23
system and after a reboot it
00:05:26
saves all the data, but the plus
00:05:28
is that thanks to the
00:05:30
structure of 2 virtual machines, even if
00:05:33
one of the computers is
00:05:34
compromised, it
00:05:36
will be impossible to identify your real IP address; this scheme will be impossible
00:05:39
generally does not allow the application to find out
00:05:41
the real pi address of the user or
00:05:43
access any information on
00:05:45
physical equipment about the free
00:05:47
ansell system. I already spoke in one
00:05:49
of my videos about bypassing the
00:05:51
blocking of bans in online games, this software is
00:05:54
designed for the windows operating system
00:05:55
and changes system data both
00:05:58
in automatic and manual mode,
00:06:01
this is also a means of anonymity;
00:06:03
however, for the most part, the software is created to
00:06:05
work with applications; now, as
00:06:07
for not only anonymity, but also
00:06:09
data substitution, have you noticed that
00:06:11
some sites know the version of your
00:06:14
operating system,
00:06:15
your screen resolution is enabled?
00:06:18
you java script or vpn or
00:06:20
whether you have adblock activated version of
00:06:22
your browser color depth of pixels
00:06:25
cookies and other functions of which you do
00:06:27
n’t even think about it’s called fren coat of arms
00:06:30
prince that is, the fingerprint of your browser
00:06:32
changing the IP address by installing a
00:06:35
vpn will no longer be enough to hide
00:06:37
traces of your presence on the site, each
00:06:39
browser has its own fingerprint, a signature of
00:06:42
which few people know; a
00:06:44
fingerprint based on canvas and a fingerprint based on
00:06:46
fonts; uniqueness is achieved due to
00:06:48
the fact that different browsers operating
00:06:51
systems and graphics video cards have a
00:06:53
slight difference in rendering the
00:06:55
same element, so in ninety
00:06:57
percent of cases it is possible to determine
00:06:59
even after changing the IP address, but there is
00:07:02
one way out in which you can change all those
00:07:05
signatures, thereby increasing your
00:07:07
anonymity, this is a browser sphere based on
00:07:10
I store the truth with all the
00:07:12
user tracking functions cut out from
00:07:14
very flexible individual
00:07:16
settings up to each osc tab,
00:07:18
the browser opens, the preference window opens
00:07:20
where you can make
00:07:22
small settings, but let's turn
00:07:24
to the browser itself and see how it is
00:07:26
done under the ringer prince, I
00:07:28
open a new session,
00:07:30
this window appears with all the settings for the
00:07:32
future tab, let's first set
00:07:35
a name, but then of course you'll have to
00:07:37
use Google, it doesn't understand
00:07:39
what's here at all written in the settings, it is
00:07:41
suggested to choose how to establish a
00:07:43
connection to the network, that is, without
00:07:45
using a proxy, using top
00:07:47
100 kV 5 ssh tunnel cake plus ssh or
00:07:51
sax from the sphere, unfortunately I don’t have
00:07:53
working proxies, so I’ll just choose the
00:07:55
Tord settings, the user-agent settings are being replaced,
00:07:58
that is, here you can specifically
00:08:00
select absolutely any browser with
00:08:03
absolutely any screen resolution with
00:08:05
absolutely any GIA position, and all this is
00:08:08
literally done in one click, past
00:08:10
this, you can convert
00:08:12
your user-agent settings into the browser, and for example, I
00:08:15
click on the user-agent manager and click
00:08:18
on the button and the new yes, if you don’t have a
00:08:20
pro version of this browser, then you don’t have a
00:08:23
shop config section, but these settings
00:08:25
can be found on the Internet, for example, let’s
00:08:27
choose a browser, there are a lot of them, but let
00:08:30
it be the amigo browser, at
00:08:32
least somewhere it’s probably useful,
00:08:34
let’s replace this one browser and
00:08:36
let's take the settings, well, the
00:08:38
latest one, I'll copy the data and
00:08:41
turn to our browser, and you
00:08:43
can also manually adjust these settings,
00:08:45
let's write the word qwerty instead of the word
00:08:47
amigo,
00:08:48
and you can also
00:08:50
change the browser version, let it be
00:08:53
version 30, we all press safe and
00:08:55
go back to the browser settings,
00:08:57
now as you will see in the user-agent pop-up window,
00:08:59
we have the settings
00:09:02
that we just added, namely the
00:09:04
amigos settings with the changed qwerty data,
00:09:07
let's select their Daria, as I
00:09:10
understand it, this is a strange prefix with which
00:09:13
we will make connections, we
00:09:14
can choose Well, let it be Singapore,
00:09:17
for example, we can specify the
00:09:18
screen resolution, let it be 1280 by 98 thousand.
00:09:24
We don’t need a config manager
00:09:26
since we just made these
00:09:27
changes, but you can do it
00:09:29
yourself and in this menu, that
00:09:31
is, select the browser, select the
00:09:33
operating system model or
00:09:36
device model and click on the generate button in
00:09:38
this case, this user-agent
00:09:40
will be updated to those that you specified in the
00:09:42
managers config, but in the virgil section
00:09:45
you can also make changes to the
00:09:47
received data. By the way, in this
00:09:50
section your coordinates are indicated,
00:09:51
remember there was a video about how you
00:09:54
can use ip ip and ip
00:09:57
determine your position
00:09:59
just in this browser if you indicate
00:10:01
your coordinates then
00:10:04
no one will be able to figure you out using the ip. For the sake of an example,
00:10:06
let’s enter some
00:10:07
coordinates to make sure they are
00:10:09
plausible, then the
00:10:11
settings for fingerprints and for
00:10:13
plugins are indicated Well, after a little
00:10:15
setup, let's still check this
00:10:16
browser on the day, the
00:10:17
screen resolution cannot be the same,
00:10:19
let's change it a little, click on the
00:10:21
safe button and wait for the connection to the
00:10:23
sites ur website was created specifically to
00:10:25
test the browser and your anonymity on the
00:10:28
network, here there is a section for settings details
00:10:30
and let’s compare all the open
00:10:32
tabs, as I already said for each tab,
00:10:35
we can specify new parameters,
00:10:37
thereby creating the appearance of a new
00:10:39
connection not related to us, and the site
00:10:41
really shows that all the data
00:10:43
on each tab is different, but these are
00:10:46
the settings that we specified, here is the
00:10:48
screen resolution
00:10:50
here are the vip peaks 30 and here are the words qwerty
00:10:53
also in the settings we indicated the English
00:10:55
language and affiliation with Singapore here
00:10:57
you go and
00:10:58
this is also indicated here now
00:11:01
let's page
00:11:02
in it fingerprints and
00:11:04
IP location I took these coordinates from the Internet
00:11:06
and here is supposedly an unusual landscape in the shape of
00:11:09
lines like you you see,
00:11:11
location substitution actually works in the
00:11:14
second IP tab, but I didn’t indicate it,
00:11:16
so it will be simply impossible to figure us out,
00:11:18
and finally, we can
00:11:20
compare fingerprints between tabs,
00:11:22
so after this video, it seems to me that you
00:11:25
understand that IP address substitution
00:11:27
is just the beginning, so guys,
00:11:30
anonymity is luxury of a modern
00:11:33
person, well, you had faith, if you
00:11:35
liked the video, then put your finger up
00:11:37
and subscribe to this channel. By the way,
00:11:39
write if you use any
00:11:41
means for anonymity and if so,
00:11:44
indicate which ones, and if not, then [ __ ] the
00:11:48
secret of private life is not intended for
00:11:51
the majority the majority do not understand its
00:11:53
value the majority do not need this secret a
00:11:55
minority of people who are a little
00:11:57
different from the rest for a little
00:11:59
unusual people not like xii
00:12:01
even in the smallest way if you do not agree with the
00:12:04
point of view of the majority yes you are the
00:12:06
person for whom the secret is intended
00:12:08
private life

Description:

https://ls.app/ - Браузер "антидетект" https://tails.net/ - ОС Tails https://www.whonix.org/ - ОС Whonix Наш Telegram канал - https://t.me/overlamer1 Второй канал - https://www.youtube.com/c/igorover Паблик - overpublic1 - https://vk.com/over_view Заказать рекламу вы можете здесь: https://docs.google.com/document/d/1cF9mJkIPJC5AeghyYSm8cS_sPZFijSGqmyjcJqerWSM/edit?usp=sharing Инстаграмчик здесь: https://www.facebook.com/unsupportedbrowser Что такое Fingerprint браузера? У каждой системы есть свой отпечаток и браузер не исключение. Просто перейдите на сайт whoer и увидите как много он знает не только о вашем браузере, но и о вашей ОС: разрешение экрана и разрешение браузера, язык системы и принадлежность к региону, часовой пояс, версию браузера и операционной системы, цветовую палитру, IP-адрес, DNS и прочее прочее прочее. На первый взгляд кажется, что сменив IP-адрес вы себя обезопасите, но увы. Благодаря каждому отпечатку браузера, который индивидуальный у каждого пользователя вас можно отследить даже если вы смените IP-адрес хоть тысячу раз. Поэтому для полной анонимности не достаточно использовать прокси, vpn или tor. Вот об этом и будет это видео. Мы поговорим про: 1) ОС Tails . Это действующая в режиме реального времени операционная система Linux, которую можно запускать практически на любом компьютере с DVD, USB-накопителя или SD-карты и не оставлять следов на компьютере, который вы используете. Важной особенностью Tails является то, что все исходящие соединения вынуждены проходить через Tor, а не анонимные соединения блокируются. 2) ОС WHONIX Операционная система состоит из двух виртуальных машин: один исключительно управляет Tor и действует как шлюз, который называется Whonix-Gateway. Другой, который называется Whonix-Workstation, находится в полностью изолированной сети. Отличие между ними в том, что Tails это независимая операционная система, которую можно запустить с любого компьютера, и она не оставляет после себя следов, а также не хранит данные. Каждый раз при запуске системы она будет как новая. В свою очередь Whonix устанавливается на уже готовую ОС посредством виртуальной машины, и она сохраняет все данные, одна Whonix невозможно деанонимизировать. 3) О бесплатной системе antiOS я уже говорил в одном из своих видео про обход блокировки в онлайн играх. Софт предназначен для операционной системы Windows, и изменяет системные данные как в автоматическом так и в ручном режиме. Это тоже является средством анонимности, правда по большой части софт создан для работы с приложениями. 4) Браузер антидетект Linken Sphere, который способен обмануть и обойти практически любую систему отслеживания и обнаружения пользователя. Он создан на основе Хрониум, в котором вырезаны все функции для отслеживания.

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Анонимность - роскошь современного человека" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Анонимность - роскошь современного человека" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Анонимность - роскошь современного человека" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Анонимность - роскошь современного человека" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Анонимность - роскошь современного человека"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Анонимность - роскошь современного человека"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.