Linux serverNETWORK ADMINISTRATIONSsmtp server liux

How to Disappear: Advanced Tech Techniques

Some people want to disappear mostly because of fear for their safety. But as you will find out, disappearing requires planning. And the irony is that in order to successfully disappear, you must have a plan that you contrive beforehand, well ahead of the time that you’d ever think of disappearing.

In this video, we will show you a different thought process. You will think through the approaches of the threat that is hunting you down. And that will be the most effective way to understand how to evade this threat.

———————————–
Brax Virtual Phone, De-Googled Phones, BytzVPN, BraxMail, BraxRouters are available on https://brax.me. Sign in to the platform to see the store. You will not be asked for personal information to sign up.
———————————–
Merch Store
https://my-store-c37a50.creator-spring.com/
———————————–

I’m the Internet Privacy Guy. I’m a public interest technologist. I’m here to educate. You are losing your Internet privacy and Internet security every day if you don’t fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I’m a licensed HAM operator.

Support this channel on Patreon! https://www.patreon.com/user?u=17858353

Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)

https://brax.me/home/rob Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise

https://bytzvpn.com Premium VPN with Pi-Hole, Cloud-Based TOR Routing

https://whatthezuck.net Cybersecurity Reference

https://brax.me Privacy Focused Social Media – Open Source

Please follow me on
Odysee
https://odysee.com/$/invite/@RobBraxmanTech:6
Rumble
https://rumble.com/c/robbraxman

source

by Rob Braxman Tech

linux smtp server

47 thoughts on “How to Disappear: Advanced Tech Techniques

  • The entire deal with crypto currencies is that every transaction is a public record available to everyone on earth.

  • I'm sitting on the edge of my seat waiting to see how there can be a discreet method of contact that can remain discreet after you explain it. I feel like, once you explain how it works, somebody performing some surveillance could just add this method to their list of things to look for?

    This is why i love this channel. Braxman is smart, he is an expert in things I've never thought about in my entire life before seeing his videos

  • Thank you for this important information. Even if you don’t want to disappear lowering your visibility is a good thing.

  • How to get rid off from a brain tag from gang stalkers. Please help. I'm in dangerous situation last 3 or more years

  • Thank you for your time and effort to help us out. More on the type of phone to get and how to use it

  • You’re like a techie Braveheart!
    It’s amazing how people get mesmerized by technology and they ignore the dark side of human nature .

  • Instructions unclear:
    I'm now employed by a three letter agency..

  • appalachia's homestead with patara <- i wanted to recommend this channel to you she's a wise woman and has some advice that i have been feeling the same about lately. you seem like a good guy i wanted to let you see this.

  • one problem with this ai can track you by your body and all public transport have cameras

  • What about pre-encrypting all msgs and have a code book?

  • Love your content Rob, but the deep base via my headphones whenever you bang the table is awful

  • Hiding in plain sight is best. Figure that one out!

  • Great video Rob. Please do one about basic SecOps for the normal "not on the run" guy, by device. How to properly configure your PC and phone just to avoid malicious actors, but when you need to use basic tech like gmail, whatsapp or even FB for work. Thanks for teaching us, your viewers.

  • Very worth it. We are lucky to have you here, to tell us how to not be here, or at least appear to not be here if ever needed.

  • I am currently being v2k and Havana syndromed remote neural monitored by John Johnson Lisa Johnson and Mallory Johnson from southern California Anaheim CA and Murrieta CA they claim they are going to frame and murder me
    If you have any knowledge on v2k or dew please let people know what they can do

  • May I please ask, in the situation of the community and being evasive ? And is there a subtle way of sending money from point to point ? I’m guessing cash or bitcoin, as you suggested

  • Anyone can disappear like a Ghost if they are on hallucinogenics. 😂

  • My wife asked me about this yesterday. Now I have more information ❤

  • I had kept a very low profile online precisely due to these things. Anything to hide? Not at the moment, not that I want to but it troubled me just to know that my online presence could be used against me. And I think I was doing a good job. I was satisfied with my as-need-basis type of online presence. Until I lost my job. That changed everything. Now I HAVE to make sure I am visible out there and as much as online presence mainly on sites like LinkedIn to be more Visible. I still use social media in a as-need -basis but in these situations and with the job market terribly bad and competitive, being invisible is not only impossible but counterproductive. How ironic huh?

  • A certain terrorist group used the maildrop method, and I believe draft messages are being scanned now

  • I just thought new hack reverse iris scan when iris is scanned it changed to digital fingerprint so why can the fingerprint then not end as a reverse tcp script in contact lenses 😮 you will hack the deep state hackers 😮😮😮😂 please send me link if someone does it open sauce 🎉don't forget WBAN Tban light photonics LED lights sum cream and acoustic bio nano sansorse and ism nano routers you need a metal sute tinfoil and rubber on the outside and build in sound cancelling tech and reverse green house borax and a bed sheet hold up in front of you thermal avoidance and buy a motorised bike and fix the balemce as I'm doing now it has no electioncs only spark coil 😮😂

  • How would you know when you should disappear like a ghost. What would signal a flag that you are being targeted. What type of mined organized AI data would alert them to want YOU. Stealing ideas, like the way you think out of the box. It's AI hungry for data. Could it just be infatuated with the way you think. Advanced troubleshooting or in other words, how to teach AI to improvise from the best teachers that don't even know they are teaching. And the person is not even being paid for their brilliance. AI on the phone that's hacked. Food for thought BRAX. Your mind must never sleep.

  • I made sure to watch this in incognito so no one knows I'm here.

  • I recall an episode of a TV series I saw many years ago where an abused wife escaped from her physically violent/abusive husband using a discreet organisation that had a pre-arranged "network" of female members with whom abused women could stay, for a limited period of time, before being moved on to the next person in that network, & before eventually reaching their "final" location.

    The members of this "network" were all people who were not previously known to the women using this service, & each member of the network only knew the contact details of the next person in the network & the previous person in the network – so most of the network members had no idea where abouts the women they helped, eventually ended up.

    At the time it seemed to me like a good way for abused women to escape from their abuser – but these days would still be dependent upon the person escaping, observing many of the precautions mentioned in the above video.

  • It's crazy how people loving peaceful life is risky.

  • the war is onlly inside your own mind. leave me in peace. i dont fight with you. you are fighting with yourself.

  • I think it might sometimes still be difficult to disappear using only cash, as quite a few places these days are starting to no longer accept cash payments at all, & only accept card payments.

    Also, even though some places like hotels & motels, may allow you to pay your bill in cash, they will often still require you to provide them with your credit card details & some personal ID.

  • I don't know if the maildrop is effective because if you sign in from a new location that email account will get an email notifying you of a new sign-in from X location showing that someone else uses that account too.

  • if using maildrop, don't delete messages as those can be recovered. instead, edit same message in draft and clear text after reading. only if ISP performs backup will msg be tracked. there are very good message embedding into images apps. Just need same app and password to extract.

Comments are closed.